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", 0x1000, 0x9}], 0x48, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1200, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) [ 151.422993][T11653] loop2: detected capacity change from 0 to 240 [ 151.527443][T11669] loop1: detected capacity change from 0 to 264192 [ 151.540737][T11669] FAT-fs (loop1): bogus number of reserved sectors [ 151.547315][T11669] FAT-fs (loop1): Can't find a valid FAT filesystem 05:56:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xd400, 0x0, 0x0, 0x0, 0x0) [ 151.609252][T11664] loop3: detected capacity change from 0 to 32760 [ 151.618131][T11664] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:56:58 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200", 0x12}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:56:58 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1436, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:56:58 executing program 4: r0 = shmget(0x0, 0x4000, 0x780003c0, &(0x7f0000ffb000/0x4000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x5000) r1 = shmget(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_RMID(r1, 0x0) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f00001e6000/0x1000)=nil) r3 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x3000)=nil, 0x4000) shmdt(r3) shmdt(r3) shmctl$SHM_LOCK(r2, 0xb) shmat(r2, &(0x7f0000ffb000/0x4000)=nil, 0x3000) 05:56:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:56:58 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x8, &(0x7f0000000200)=0x5, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x900}, 0x1c) 05:56:58 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) 05:56:58 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 151.744263][T11692] loop1: detected capacity change from 0 to 264192 [ 151.751259][T11699] loop2: detected capacity change from 0 to 240 [ 151.773725][T11692] FAT-fs (loop1): invalid media value (0x00) [ 151.779834][T11692] FAT-fs (loop1): Can't find a valid FAT filesystem 05:56:58 executing program 4: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x54, r0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x7}, @NL802154_ATTR_SEC_DEVKEY={0x18, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_ID={0x14, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x54}, 0x1, 0x0, 0x0, 0x11}, 0x4000) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000000640)=[{&(0x7f0000000100)=';', 0x1}, {&(0x7f0000000440)="fd", 0x1, 0x7e72f114}], 0x0, 0x0) 05:56:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:56:58 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1900, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:56:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1800000000000000, &(0x7f00000000c0)={[{@huge_never}]}) [ 151.851594][T11713] loop2: detected capacity change from 0 to 240 [ 151.874763][T11720] loop4: detected capacity change from 0 to 264192 [ 152.019246][T11740] loop2: detected capacity change from 0 to 240 05:56:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xf07f, 0x0, 0x0, 0x0, 0x0) [ 152.486156][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 152.486170][ T25] audit: type=1326 audit(1619675819.371:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11679 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:56:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1900000000000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:56:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x400, 0xff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) shutdown(r2, 0x0) connect$unix(r0, &(0x7f0000fce000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r3 = accept(r1, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000280)="ce", 0x1, 0xc840, 0x0, 0x0) 05:56:59 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200", 0x12}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:56:59 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 152.575435][ T25] audit: type=1326 audit(1619675819.461:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11749 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:56:59 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000080), &(0x7f0000000140), 0x2, 0x4) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xfe, &(0x7f0000000900)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) splice(r1, &(0x7f0000000180)=0x7, r2, &(0x7f00000001c0)=0x1ff, 0x4, 0x8) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x17) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) r4 = gettid() tkill(r4, 0x40) 05:56:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:56:59 executing program 4: r0 = socket(0x400000000000010, 0x802, 0x0) write(r0, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) tee(0xffffffffffffffff, r0, 0x7fffffff, 0xa) r1 = socket(0x2, 0x5, 0x8) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'lo\x00', &(0x7f0000000000)=@ethtool_modinfo={0x1c}}) [ 152.630573][T11761] loop2: detected capacity change from 0 to 240 05:56:59 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2010, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:56:59 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4c1) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) write$cgroup_int(r0, &(0x7f0000000140), 0xfdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f000026c000/0x1000)=nil, 0x1000, 0x9, 0x30, r2, 0x7a2b7000) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) truncate(&(0x7f00000000c0)='./file0/bus\x00', 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) preadv(r3, &(0x7f0000002600)=[{&(0x7f0000000180)=""/124, 0x7c}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/208, 0xd0}, {&(0x7f0000001300)=""/131, 0x83}, {&(0x7f00000013c0)=""/223, 0xdf}, {&(0x7f00000014c0)=""/181, 0xb5}, {&(0x7f0000001580)=""/69, 0x45}, {&(0x7f0000001600)=""/4096, 0x1000}], 0x8, 0x6, 0x9) 05:56:59 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2200, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:56:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2200000000000000, &(0x7f00000000c0)={[{@huge_never}]}) [ 152.739806][T11782] loop2: detected capacity change from 0 to 240 [ 152.805946][T11796] loop1: detected capacity change from 0 to 264192 [ 152.814771][T11796] FAT-fs (loop1): invalid media value (0x00) [ 152.820816][T11796] FAT-fs (loop1): Can't find a valid FAT filesystem [ 152.859366][T11807] loop2: detected capacity change from 0 to 240 [ 153.409365][ T25] audit: type=1326 audit(1619675820.291:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11749 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xfc7f, 0x0, 0x0, 0x0, 0x0) 05:57:00 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x1}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, 0x16, 0x10, 0x0, 0x0, {0xa}, [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x47}]}]}, 0x1c}}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000140)="29af804c004865dbb4e68c838bb58ff349d60fbe740b96449e2f50fec57cc10f4ce9782a1250f86f9c566da3302f78e89f0b7c1b43a87378a30b95cc3e9c6d26068c8cdb6107e26e65d0dbedb5bf0a64f822db4ff57596f9ff1c04055dfb16f6f185c8f33f637ce44faaf01b2e61dce0d2a986f616c9e426fb8ee3d761eab433ac651d9be4a35ead6911e0", 0x8b}, {&(0x7f0000000200)="76718503bd4fd01c367233663caf34590f201ed00d0f7aa5cb3118aa792fa371b31ccac7fd8912bf2abf32ead8193304a5e6ac43ab2b62346e52f43eed94ccdfde542f771f80753a72568b05b8d2b3a95765d6ee01741a34fb28a4c0584138b2f97b01afbf9934b45b2cc51394d772797e3210f5c47f494f16324ccb8082b580856cc525f33a714d2c0cfaf983bf5bdc6c7b", 0x92}, {&(0x7f0000000000)="ddcebf607478e506f41ebbb156c97c721ae69059a1341964467b3052f1af2c4d1e4a053cff0e1b4a39cdbabf1840274c1d75780e3461fa533a7434505d0c", 0x3e}, {&(0x7f00000002c0)="c4c3efd7de7857c6a060f8253b2d2726b536eab0b0367860d4b5b7bbb22d0d72b95caadff0d0a5d81bf1b700526c9bec54d9f9b060dd92fe5d968c7909f2874810ef82b563400394aa2c05a18e8de62b7915f80e706a2d689ba9924d1d2677ca4802eae88a650df18795acd1589bfa9422a4b93ff15ec2f0818d405a114c7d1f799b2d1b362e6a0e9f8c0e4eedfcca4e96cd377616310cb5215635935bb7dedfce03aeed463f4a0ffa087392066f29dbb5268d9b999525a8a03f48817609cb58cc49966b982f3db4ac2793136ca161a9fa47ba90c79aa69b9c9d41121ab82a6431e525694b22a80b", 0xe8}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f00000003c0)="c37d3bacd887d832d292da05774cbc469e6c83fdee2fd54b1f9fd77ad4f011863809efd4e785de57c504f5dbd29a45949921d2edf5b870b1dbccc2f441b925f03bfe1e3e1a80d47a230dc1f9442132f71d570557916239efdf116816ca1362f33fff28a32f7d9b24ee8f86f7bef68dc8f7285a4c04534dd0fe80bbb15330045ee5", 0x81}], 0x6) 05:57:00 executing program 3: rseq(&(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x4000800, 0x201fffff}, 0x4}, 0x20, 0x0, 0x0) rseq(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x7, 0x0, 0x2, 0xc9e1}, 0x7}, 0x20, 0x40, 0x0) rseq(&(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4, 0x101, 0xf106, 0x4}}, 0x20, 0x0, 0x0) rseq(&(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x6, 0x101, 0x1, 0xffffffffffffffb4}}, 0x20, 0x0, 0x0) close(0xffffffffffffffff) bind$netlink(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfc, 0x44100000}, 0xc) [ 153.520183][ T25] audit: type=1326 audit(1619675820.411:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11822 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:00 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200", 0x12}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:00 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2600000000000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x69, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() r3 = getpid() ptrace$cont(0x1f, r3, 0x8ed700000000000, 0x20) tkill(r2, 0x34) 05:57:00 executing program 3: sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, 0x0, 0x0) unshare(0x6c060000) r0 = socket$inet6(0xa, 0x1, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x801, 0x0, 0x0, {0xa, 0x0, 0x7}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40800}, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffbfbbfbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) 05:57:00 executing program 4: unshare(0x8000400) r0 = mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00004c6000/0xe000)=nil, 0xe000, 0x1800007, 0x12, r1, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000040)={0x0, 0x6}) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid_for_children\x00') fadvise64(r2, 0x3, 0x6, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(0xffffffffffffffff, &(0x7f0000002780)=[{&(0x7f0000001280)="a08a7367f06dcd1b3b96a1908dcff2239d8fa3dd432350054a2b4ccdc194805a3c02bf6879441499b0673b8af6b57c86fe", 0x31}, {&(0x7f00000012c0)="30f1a969f8f76b4b74ffc69b315ec09db36260bc4358d616e09625ef0cd0074ca4fb2a18f94a0769a567a1fb94a1a7e683b1c4ba9c56a925659c71f4fc88e36e1a9dc55d3374e9974e0d73bf0b661437cc13299eddfcd3bdd75f92c83721a00de439e1e40be0191c9b4bc76ce129f5c65c904a144d6c31527ce8f2e7846ba369fe277cb5f72aafc5304703c54132a7427d342cd4db4749e96e2236b21740dc02bcf301e90e2e8beaddd88e9aec9c741b391ae42b9b03826936b78374ca89208923e6c50db6318edf5e85f8a2266fc4118f2d10ed", 0xd4}, {&(0x7f00000013c0)="8b1406e3845e0319f95bdac0be6b673e0c52050284e7bf4718451b4d8fb5906c7229cccac732aced", 0x28}, {&(0x7f0000001400)="148cc796e20e37d0100eb50d1a710fcc88339b31b607db3e22116f1c525137cf4fe2381109f5e372428107250738af8301b76080ff5e765d95e796c3b90ba52f44afc169b58bcbcc62b85acbde3e8331012a1c2d8e5037ba7868fd5d162065b3dd0db44c77954f9a1000e3cb4a18d448ec8d78d5236eb6e46a2ab487e42d18a40d8102938a3f70840f4d8f19865a793bc58556fb26c024d55945fc922421952ab2ecd6dbc3f8", 0xa6}, {&(0x7f00000014c0)="a1ad3808919b7ab663e7e19d16bfd0c68fb4198c14c996b632161db05ce8573186a3ad1c7bd32400f92619f6969b624a32e4ac2a9a10a4fd7e4156dc1fd7a4708a3dc8adebf3bdc3cb7da862df10375c52cf6dbe0335631e4849b8db7481c6c2270163810d0cb3f8096e2cbb5d692e3a473f62ef0f244146078d1e8d4a8c1d70c39be38442be04ea8a79d9a297c4d696e010ab024b5b00894ce2ac4ec0f2f6b7d1ea552c3250bac9f517fdf3ab4147526136ae9f0f302d9bfa228878", 0xbc}, {&(0x7f0000001580)="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", 0xfd}, {&(0x7f0000001680)="56086e511fafdcb961362bd88f5341720ec5c5190f3399d1a8a8326e8046cb6ef59143d722c77216b6c167d8deb5266b3f75c285671398238c20138d3784bd3e9bd3d7b4b10bd2f969b5268890ca2f450092", 0x52}, {&(0x7f0000001700)="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", 0x1000}, {&(0x7f0000002700)="bfd67e1b2f2323ace3457fb1b0fba0a924cf678e2025e718c76bdaa1394cd67dc31c2f4167969ffdd3e28023d712c4cf47aee4aba7c1f63622ddc8c4daa6d09990d66437", 0x44}], 0x9) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) unshare(0x8020000) mq_timedsend(r1, &(0x7f0000000100)="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", 0x1000, 0x3ff, &(0x7f0000001100)) r3 = syz_open_procfs(0x0, &(0x7f0000001240)='net/nf_conntrack_expect\x00') setns(r3, 0x20000) r4 = socket$inet(0x10, 0x80002, 0x0) dup2(r4, r0) clock_gettime(0x0, &(0x7f00000011c0)={0x0, 0x0}) mq_timedreceive(r0, &(0x7f0000001140)=""/126, 0x7e, 0x2, &(0x7f0000001200)={r5, r6+60000000}) 05:57:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2f05000000000000, &(0x7f00000000c0)={[{@huge_never}]}) [ 153.694097][T11846] loop2: detected capacity change from 0 to 240 05:57:00 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3303, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x18, 0x8001, 0x3f, 0x2, 0x0, 0x1d6, 0x7, 0xf2}, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x5, 0x10000066, 0x4, 0x5, 0x7e8c1607, 0x0, 0xfffffffffffffffc, 0xffffffff, 0x4}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace(0x4207, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 153.829637][T11869] loop3: detected capacity change from 0 to 4096 [ 153.840733][T11869] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 153.851260][T11869] EXT4-fs (loop3): group descriptors corrupted! [ 153.856043][T11868] loop2: detected capacity change from 0 to 240 [ 153.870848][T11877] loop1: detected capacity change from 0 to 264192 [ 153.892810][T11877] FAT-fs (loop1): invalid media value (0x00) [ 153.898921][T11877] FAT-fs (loop1): Can't find a valid FAT filesystem 05:57:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xff7f, 0x0, 0x0, 0x0, 0x0) 05:57:01 executing program 4: unshare(0x6c060000) set_mempolicy(0x2, &(0x7f00000000c0)=0xffffffffffff0ded, 0x7fff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00', 0x21880}, &(0x7f0000000080)=0x54) recvmmsg(r0, &(0x7f0000003700)=[{{&(0x7f0000000100)=@caif=@dbg, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/43, 0x2b}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x3f}, {{&(0x7f0000000240)=@nfc_llcp, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/207, 0xcf}, {&(0x7f00000003c0)=""/50, 0x32}, {&(0x7f0000000400)=""/242, 0xf2}, {&(0x7f0000000500)=""/5, 0x5}, {&(0x7f0000000540)=""/137, 0x89}, {&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f0000000700)=""/29, 0x1d}], 0x7, &(0x7f00000007c0)=""/197, 0xc5}, 0x80000000}, {{&(0x7f00000008c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000940), 0x0, &(0x7f0000000980)=""/15, 0xf}, 0x9}, {{&(0x7f00000009c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000a40)}], 0x1}, 0x7}, {{&(0x7f0000000ac0)=@un=@abs, 0x80, &(0x7f0000003100)=[{&(0x7f0000000b40)=""/183, 0xb7}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/92, 0x5c}, {&(0x7f0000001c80)=""/156, 0x9c}, {&(0x7f0000001d40)=""/4096, 0x1000}, {&(0x7f0000002d40)=""/152, 0x98}, {&(0x7f0000002e00)=""/162, 0xa2}, {&(0x7f0000002ec0)=""/241, 0xf1}, {&(0x7f0000002fc0)=""/85, 0x55}, {&(0x7f0000003040)=""/158, 0x9e}], 0xa}, 0x1}, {{0x0, 0x0, &(0x7f00000033c0)=[{&(0x7f00000031c0)=""/18, 0x12}, {&(0x7f0000003200)=""/52, 0x34}, {&(0x7f0000003240)=""/228, 0xe4}, {&(0x7f0000003340)=""/96, 0x60}], 0x4, &(0x7f0000003400)=""/60, 0x3c}, 0xb84}, {{0x0, 0x0, &(0x7f0000003640)=[{&(0x7f0000003440)=""/13, 0xd}, {&(0x7f0000003480)=""/185, 0xb9}, {&(0x7f0000003540)=""/64, 0x40}, {&(0x7f0000003580)=""/72, 0x48}, {&(0x7f0000003600)=""/33, 0x21}], 0x5, &(0x7f00000036c0)=""/1, 0x1}, 0x3}], 0x7, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, &(0x7f00000038c0)={0x2, 0xc, 0x0, 0x5, 0x0, [@remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @remote, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1]}, 0x68) socket$inet(0x2, 0x3, 0x400) 05:57:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3403000000000000, &(0x7f00000000c0)={[{@huge_never}]}) [ 154.330601][ T25] audit: type=1326 audit(1619675821.221:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11822 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 154.412710][ T25] audit: type=1326 audit(1619675821.301:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11889 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x18, 0x8001, 0x3f, 0x2, 0x0, 0x1d6, 0x7, 0xf2}, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x5, 0x10000066, 0x4, 0x5, 0x7e8c1607, 0x0, 0xfffffffffffffffc, 0xffffffff, 0x4}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace(0x4207, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:01 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3614, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3603000000000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:01 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:01 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 154.731469][T11907] loop2: detected capacity change from 0 to 240 [ 154.754792][T11909] loop3: detected capacity change from 0 to 4096 05:57:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x18, 0x8001, 0x3f, 0x2, 0x0, 0x1d6, 0x7, 0xf2}, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x5, 0x10000066, 0x4, 0x5, 0x7e8c1607, 0x0, 0xfffffffffffffffc, 0xffffffff, 0x4}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace(0x4207, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 154.774346][T11909] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 154.785051][T11909] EXT4-fs (loop3): group descriptors corrupted! 05:57:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, &(0x7f00000000c0)={[{@huge_never}]}) [ 154.829751][T11921] loop2: detected capacity change from 0 to 240 05:57:01 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 154.897359][T11930] loop3: detected capacity change from 0 to 4096 [ 154.907569][T11930] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 154.918178][T11930] EXT4-fs (loop3): group descriptors corrupted! [ 154.968521][T11935] loop1: detected capacity change from 0 to 264192 [ 155.000565][T11935] FAT-fs (loop1): invalid media value (0x00) [ 155.006719][T11935] FAT-fs (loop1): Can't find a valid FAT filesystem [ 155.019325][T11944] loop2: detected capacity change from 0 to 240 05:57:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x1b000, 0x0, 0x0, 0x0, 0x0) [ 155.236719][ T25] audit: type=1326 audit(1619675822.121:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11889 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8004000000000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x18, 0x8001, 0x3f, 0x2, 0x0, 0x1d6, 0x7, 0xf2}, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x5, 0x10000066, 0x4, 0x5, 0x7e8c1607, 0x0, 0xfffffffffffffffc, 0xffffffff, 0x4}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace(0x4207, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:02 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4502, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 155.311171][ T25] audit: type=1326 audit(1619675822.201:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11959 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:02 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) sendfile(r0, r1, &(0x7f0000000180)=0x7db2, 0x3) r3 = openat$cgroup_devices(r1, &(0x7f00000000c0)='devices.allow\x00', 0x2, 0x0) open_by_handle_at(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1000000004b2560a6e0700829ac4000000000004000100050000000600000000000000"], 0x202000) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)=0x4) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r5, 0xb653000) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000200)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r7 = socket(0x400000000000010, 0x802, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000240)={0x0, 0x5, 0x3}) [ 155.385415][T11969] loop3: detected capacity change from 0 to 4096 [ 155.396674][T11969] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 155.407219][T11969] EXT4-fs (loop3): group descriptors corrupted! [ 155.423968][T11972] loop2: detected capacity change from 0 to 240 05:57:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x18, 0x8001, 0x3f, 0x2, 0x0, 0x1d6, 0x7, 0xf2}, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x5, 0x10000066, 0x4, 0x5, 0x7e8c1607, 0x0, 0xfffffffffffffffc, 0xffffffff, 0x4}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace(0x4207, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 155.539766][T11989] loop3: detected capacity change from 0 to 4096 [ 155.560853][T11989] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 155.571448][T11989] EXT4-fs (loop3): group descriptors corrupted! 05:57:02 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x68, 0x0, 0x1, 0x409, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_DST={0x4}]}, 0x68}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="6800000001010101"], 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x1) 05:57:02 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x18, 0x8001, 0x3f, 0x2, 0x0, 0x1d6, 0x7, 0xf2}, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x5, 0x10000066, 0x4, 0x5, 0x7e8c1607, 0x0, 0xfffffffffffffffc, 0xffffffff, 0x4}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace(0x4207, r1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x18, 0x8001, 0x3f, 0x2, 0x0, 0x1d6, 0x7, 0xf2}, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x5, 0x10000066, 0x4, 0x5, 0x7e8c1607, 0x0, 0xfffffffffffffffc, 0xffffffff, 0x4}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 155.802586][T12001] loop2: detected capacity change from 0 to 240 [ 155.817308][T12005] loop3: detected capacity change from 0 to 4096 [ 155.826635][T12005] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 155.837156][T12005] EXT4-fs (loop3): group descriptors corrupted! [ 155.926926][T12019] loop1: detected capacity change from 0 to 264192 [ 155.932169][T12017] loop3: detected capacity change from 0 to 4096 [ 155.942489][T12017] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 155.946972][T12019] FAT-fs (loop1): invalid media value (0x00) [ 155.952996][T12017] EXT4-fs (loop3): group descriptors corrupted! [ 155.965275][T12019] FAT-fs (loop1): Can't find a valid FAT filesystem 05:57:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x30000, 0x0, 0x0, 0x0, 0x0) 05:57:03 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x18, 0x8001, 0x3f, 0x2, 0x0, 0x1d6, 0x7, 0xf2}, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x5, 0x10000066, 0x4, 0x5, 0x7e8c1607, 0x0, 0xfffffffffffffffc, 0xffffffff, 0x4}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace(0x4207, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x9900000000000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x18, 0x8001, 0x3f, 0x2, 0x0, 0x1d6, 0x7, 0xf2}, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x5, 0x10000066, 0x4, 0x5, 0x7e8c1607, 0x0, 0xfffffffffffffffc, 0xffffffff, 0x4}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 156.149838][ T25] audit: type=1326 audit(1619675823.041:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11959 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 156.232625][ T25] audit: type=1326 audit(1619675823.121:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12033 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 156.265068][T12043] loop2: detected capacity change from 0 to 240 [ 156.271821][T12040] loop4: detected capacity change from 0 to 4096 05:57:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x9b00000000000000, &(0x7f00000000c0)={[{@huge_never}]}) [ 156.289853][T12040] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 156.300486][T12040] EXT4-fs (loop4): group descriptors corrupted! [ 156.318838][T12041] loop3: detected capacity change from 0 to 4096 [ 156.329027][T12041] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 156.339555][T12041] EXT4-fs (loop3): group descriptors corrupted! 05:57:03 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x18, 0x8001, 0x3f, 0x2, 0x0, 0x1d6, 0x7, 0xf2}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:03 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x9c00000000000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x18, 0x8001, 0x3f, 0x2, 0x0, 0x1d6, 0x7, 0xf2}, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x5, 0x10000066, 0x4, 0x5, 0x7e8c1607, 0x0, 0xfffffffffffffffc, 0xffffffff, 0x4}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace(0x4207, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 156.786645][T12068] loop3: detected capacity change from 0 to 4096 [ 156.795000][T12068] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 156.806344][T12068] EXT4-fs (loop3): group descriptors corrupted! [ 156.813179][T12070] loop2: detected capacity change from 0 to 240 [ 156.821533][T12073] loop4: detected capacity change from 0 to 4096 [ 156.839824][T12073] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 156.850774][T12073] EXT4-fs (loop4): group descriptors corrupted! [ 156.910234][T12083] loop3: detected capacity change from 0 to 4096 [ 156.920837][T12083] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 156.931357][T12083] EXT4-fs (loop3): group descriptors corrupted! [ 156.959475][T12091] loop1: detected capacity change from 0 to 264192 [ 156.968370][T12091] FAT-fs (loop1): invalid media value (0x00) [ 156.974435][T12091] FAT-fs (loop1): Can't find a valid FAT filesystem 05:57:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x50000, 0x0, 0x0, 0x0, 0x0) 05:57:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x18, 0x8001, 0x3f, 0x2, 0x0, 0x1d6, 0x7, 0xf2}, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x5, 0x10000066, 0x4, 0x5, 0x7e8c1607, 0x0, 0xfffffffffffffffc, 0xffffffff, 0x4}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace(0x4207, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xc900000000000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:04 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:04 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 157.172109][T12106] loop3: detected capacity change from 0 to 4096 [ 157.173017][T12105] loop2: detected capacity change from 0 to 240 [ 157.194891][T12106] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 157.201185][T12108] loop4: detected capacity change from 0 to 4096 [ 157.205372][T12106] EXT4-fs (loop3): group descriptors corrupted! 05:57:04 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 157.228352][T12108] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 157.240682][T12108] EXT4-fs (loop4): group descriptors corrupted! [ 157.320904][T12121] loop3: detected capacity change from 0 to 4096 [ 157.331635][T12121] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 157.342239][T12121] EXT4-fs (loop3): group descriptors corrupted! 05:57:04 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xcb00000000000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x18, 0x8001, 0x3f, 0x2, 0x0, 0x1d6, 0x7, 0xf2}, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x5, 0x10000066, 0x4, 0x5, 0x7e8c1607, 0x0, 0xfffffffffffffffc, 0xffffffff, 0x4}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace(0x4207, r1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:04 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7400, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:04 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf0ffffff00000000, &(0x7f00000000c0)={[{@huge_never}]}) [ 157.837190][T12136] loop4: detected capacity change from 0 to 4096 [ 157.846135][T12136] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 157.857012][T12136] EXT4-fs (loop4): group descriptors corrupted! [ 157.867543][T12137] loop2: detected capacity change from 0 to 240 [ 157.874626][T12134] loop3: detected capacity change from 0 to 4096 [ 157.903973][T12134] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 157.914468][T12134] EXT4-fs (loop3): group descriptors corrupted! [ 157.981335][T12155] loop1: detected capacity change from 0 to 264192 [ 157.998925][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 157.998939][ T25] audit: type=1326 audit(1619675824.881:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12099 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0) 05:57:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x18, 0x8001, 0x3f, 0x2, 0x0, 0x1d6, 0x7, 0xf2}, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x5, 0x10000066, 0x4, 0x5, 0x7e8c1607, 0x0, 0xfffffffffffffffc, 0xffffffff, 0x4}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:04 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 158.018154][T12155] FAT-fs (loop1): bogus number of FAT sectors [ 158.034708][T12155] FAT-fs (loop1): Can't find a valid FAT filesystem [ 158.082263][ T25] audit: type=1326 audit(1619675824.971:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12167 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 158.116126][T12171] loop2: detected capacity change from 0 to 240 [ 158.122796][T12170] loop3: detected capacity change from 0 to 4096 [ 158.132314][T12170] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 158.132859][T12173] loop4: detected capacity change from 0 to 4096 [ 158.142963][T12170] EXT4-fs (loop3): group descriptors corrupted! [ 158.159494][T12173] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 158.170018][T12173] EXT4-fs (loop4): group descriptors corrupted! 05:57:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 158.251316][T12190] loop3: detected capacity change from 0 to 4096 05:57:05 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x18, 0x8001, 0x3f, 0x2, 0x0, 0x1d6, 0x7, 0xf2}, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x5, 0x10000066, 0x4, 0x5, 0x7e8c1607, 0x0, 0xfffffffffffffffc, 0xffffffff, 0x4}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf9fdffff00000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:05 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xba01, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff00000000, &(0x7f00000000c0)={[{@huge_never}]}) [ 158.855710][T12206] loop3: detected capacity change from 0 to 4096 [ 158.856929][T12208] loop2: detected capacity change from 0 to 240 [ 158.869975][T12209] loop4: detected capacity change from 0 to 4096 [ 158.878446][T12209] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 158.888948][T12209] EXT4-fs (loop4): group descriptors corrupted! [ 158.919685][ T25] audit: type=1326 audit(1619675825.811:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12167 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x12cba1, 0x0, 0x0, 0x0, 0x0) 05:57:05 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xcb00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x18, 0x8001, 0x3f, 0x2, 0x0, 0x1d6, 0x7, 0xf2}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xff03000000000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:05 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xde00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 159.015084][T12231] loop2: detected capacity change from 0 to 240 [ 159.034658][ T25] audit: type=1326 audit(1619675825.901:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12230 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 159.051339][T12237] loop1: detected capacity change from 0 to 264192 [ 159.085749][T12242] loop4: detected capacity change from 0 to 4096 [ 159.095393][T12242] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 159.106534][T12242] EXT4-fs (loop4): group descriptors corrupted! [ 159.112446][T12237] FAT-fs (loop1): bogus number of FAT sectors [ 159.118933][T12237] FAT-fs (loop1): Can't find a valid FAT filesystem [ 159.127396][T12252] loop3: detected capacity change from 0 to 4096 [ 159.141212][T12253] loop2: detected capacity change from 0 to 240 05:57:06 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffff1f0000000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:06 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 159.846669][ T25] audit: type=1326 audit(1619675826.731:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12230 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0) [ 159.907854][T12273] loop4: detected capacity change from 0 to 4096 [ 159.917164][T12273] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 159.927899][T12273] EXT4-fs (loop4): group descriptors corrupted! [ 159.939318][T12276] loop2: detected capacity change from 0 to 240 05:57:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 159.946385][ T25] audit: type=1326 audit(1619675826.831:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12280 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 159.949816][T12277] loop3: detected capacity change from 0 to 4096 05:57:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:06 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfc07, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 160.065453][T12297] loop4: detected capacity change from 0 to 4096 [ 160.074839][T12302] loop3: detected capacity change from 0 to 4096 [ 160.081736][T12297] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 160.092315][T12297] EXT4-fs (loop4): group descriptors corrupted! 05:57:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 160.119531][T12310] loop2: detected capacity change from 0 to 240 [ 160.176007][T12321] loop4: detected capacity change from 0 to 4096 [ 160.199249][T12321] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 160.209725][T12321] EXT4-fs (loop4): group descriptors corrupted! [ 160.225226][T12330] loop1: detected capacity change from 0 to 264192 [ 160.233348][T12330] FAT-fs (loop1): bogus number of FAT sectors [ 160.239499][T12330] FAT-fs (loop1): Can't find a valid FAT filesystem [ 160.776392][ T25] audit: type=1326 audit(1619675827.661:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12280 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never, 0x22}]}) 05:57:07 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfeff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:07 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x300000, 0x0, 0x0, 0x0, 0x0) [ 161.091725][T12347] tmpfs: Bad value for 'huge' [ 161.096651][T12345] loop3: detected capacity change from 0 to 4096 [ 161.099621][T12346] loop2: detected capacity change from 0 to 240 [ 161.109540][T12349] loop4: detected capacity change from 0 to 4096 05:57:08 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never, 0x2f}]}) [ 161.119835][ T25] audit: type=1326 audit(1619675828.011:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12344 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:08 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 161.169109][T12349] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 161.179644][T12349] EXT4-fs (loop4): group descriptors corrupted! [ 161.207026][T12364] tmpfs: Bad value for 'huge' 05:57:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) [ 161.255125][T12373] loop3: detected capacity change from 0 to 68 [ 161.261551][T12372] loop4: detected capacity change from 0 to 4096 [ 161.277049][T12375] loop2: detected capacity change from 0 to 240 [ 161.287456][T12372] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 161.297984][T12372] EXT4-fs (loop4): group descriptors corrupted! [ 161.308492][T12373] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (8 blocks) 05:57:08 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}], [], 0x2}) 05:57:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 161.360204][T12390] loop1: detected capacity change from 0 to 264192 [ 161.384819][T12396] tmpfs: Unknown parameter '' 05:57:08 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 161.454024][T12409] loop4: detected capacity change from 0 to 4096 [ 161.460624][T12407] loop2: detected capacity change from 0 to 512 [ 161.476949][T12410] loop3: detected capacity change from 0 to 68 [ 161.493239][T12410] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (8 blocks) [ 161.566204][T12424] loop1: detected capacity change from 0 to 264192 05:57:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x700000, 0x0, 0x0, 0x0, 0x0) 05:57:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}], [], 0x3}) 05:57:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:08 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:08 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 161.932765][ T25] audit: type=1326 audit(1619675828.821:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12344 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 162.016785][T12443] tmpfs: Unknown parameter '' [ 162.022306][T12444] loop3: detected capacity change from 0 to 68 [ 162.023106][T12447] loop1: detected capacity change from 0 to 264192 [ 162.038965][ T25] audit: type=1326 audit(1619675828.931:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12440 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}], [], 0x4}) [ 162.042320][T12448] loop4: detected capacity change from 0 to 4096 [ 162.063363][T12445] loop2: detected capacity change from 0 to 1024 [ 162.086283][T12444] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (8 blocks) 05:57:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:09 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xc0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}], [], 0x5}) [ 162.128633][T12460] tmpfs: Unknown parameter '' 05:57:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:09 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 162.192421][T12470] loop2: detected capacity change from 0 to 1536 [ 162.198089][T12471] tmpfs: Unknown parameter '' [ 162.245671][T12477] loop4: detected capacity change from 0 to 4096 [ 162.326360][T12492] loop1: detected capacity change from 0 to 264192 05:57:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0) 05:57:09 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1fffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}], [], 0x6}) 05:57:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:09 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x400000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 162.950319][T12504] loop2: detected capacity change from 0 to 4095 [ 162.970507][T12510] tmpfs: Unknown parameter '' [ 162.977458][T12508] loop4: detected capacity change from 0 to 4096 05:57:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}], [], 0x7}) 05:57:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 163.026033][T12522] loop3: detected capacity change from 0 to 4096 [ 163.034767][T12522] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 163.045336][T12522] EXT4-fs (loop3): group descriptors corrupted! [ 163.058269][T12524] loop2: detected capacity change from 0 to 8192 [ 163.060781][T12533] tmpfs: Unknown parameter '' 05:57:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}], [], 0x8}) [ 163.074162][T12531] loop4: detected capacity change from 0 to 4096 05:57:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 163.103699][T12541] tmpfs: Unknown parameter '' 05:57:10 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 163.165149][T12546] loop4: detected capacity change from 0 to 4096 [ 163.312720][T12555] loop1: detected capacity change from 0 to 264192 05:57:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xb00100, 0x0, 0x0, 0x0, 0x0) 05:57:10 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xe0ffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}], [], 0x18}) 05:57:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 163.787883][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 163.787899][ T25] audit: type=1326 audit(1619675830.671:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12502 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 163.873160][T12569] loop3: detected capacity change from 0 to 4096 [ 163.883967][T12569] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 163.894502][T12569] EXT4-fs (loop3): group descriptors corrupted! [ 163.894903][T12574] tmpfs: Unknown parameter '' 05:57:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}], [], 0x19}) [ 163.905938][ T25] audit: type=1326 audit(1619675830.791:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12568 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 163.905966][T12575] loop2: detected capacity change from 0 to 28799 [ 163.939320][T12576] loop4: detected capacity change from 0 to 68 [ 163.974764][T12585] tmpfs: Unknown parameter '' [ 163.985674][T12576] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (8 blocks) 05:57:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:10 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}], [], 0x22}) [ 164.084793][T12593] loop3: detected capacity change from 0 to 4096 [ 164.085636][T12595] loop4: detected capacity change from 0 to 68 [ 164.096993][T12601] tmpfs: Unknown parameter '"' [ 164.105084][T12595] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (8 blocks) 05:57:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:11 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 164.126123][T12593] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 164.135909][T12593] EXT4-fs (loop3): group descriptors corrupted! [ 164.158662][T12611] loop2: detected capacity change from 0 to 32768 [ 164.170980][T12613] loop4: detected capacity change from 0 to 68 [ 164.180468][T12613] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (8 blocks) [ 164.299881][T12624] loop1: detected capacity change from 0 to 264192 [ 164.709291][ T25] audit: type=1326 audit(1619675831.601:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12568 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0) 05:57:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}], [], 0x26}) 05:57:11 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) [ 164.805362][T12638] tmpfs: Unknown parameter '&' [ 164.805771][T12640] loop3: detected capacity change from 0 to 4096 [ 164.816783][T12637] loop2: detected capacity change from 0 to 65536 [ 164.823913][T12640] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 164.833749][T12640] EXT4-fs (loop3): group descriptors corrupted! 05:57:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}], [], 0x99}) 05:57:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) [ 164.842812][ T25] audit: type=1326 audit(1619675831.731:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12633 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:11 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2040000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 164.905223][T12653] tmpfs: Unknown parameter '™' 05:57:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}], [], 0x9b}) 05:57:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) [ 164.982044][T12660] loop3: detected capacity change from 0 to 4096 [ 164.995602][T12665] tmpfs: Unknown parameter '›' [ 165.019988][T12660] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 165.029839][T12660] EXT4-fs (loop3): group descriptors corrupted! [ 165.037254][T12673] loop2: detected capacity change from 0 to 66048 05:57:12 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(0x0) r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 165.290598][T12686] loop1: detected capacity change from 0 to 264192 [ 165.637136][ T25] audit: type=1326 audit(1619675832.521:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12633 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0) 05:57:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}], [], 0x9c}) 05:57:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:12 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 165.724669][ T25] audit: type=1326 audit(1619675832.611:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12697 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 165.739964][T12703] tmpfs: Unknown parameter 'œ' [ 165.753901][T12699] loop2: detected capacity change from 0 to 98304 [ 165.754248][T12700] loop3: detected capacity change from 0 to 4096 05:57:12 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 165.774502][T12704] loop4: detected capacity change from 0 to 4096 [ 165.801701][T12704] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 165.812555][T12704] EXT4-fs (loop4): group descriptors corrupted! 05:57:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}], [], 0xc9}) [ 165.820860][T12700] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 165.830683][T12700] EXT4-fs (loop3): group descriptors corrupted! [ 165.856722][T12715] loop2: detected capacity change from 0 to 131072 05:57:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}], [], 0xcb}) 05:57:12 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 165.935481][T12727] tmpfs: Unknown parameter 'É' [ 165.941536][T12728] loop4: detected capacity change from 0 to 4096 [ 165.955033][T12730] loop3: detected capacity change from 0 to 4096 [ 165.962858][T12728] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 165.973545][T12728] EXT4-fs (loop4): group descriptors corrupted! [ 166.001037][T12730] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 166.010910][T12730] EXT4-fs (loop3): group descriptors corrupted! [ 166.027381][T12739] tmpfs: Unknown parameter 'Ë' [ 166.054888][T12738] loop2: detected capacity change from 0 to 163840 05:57:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 166.151976][T12750] loop4: detected capacity change from 0 to 4096 [ 166.162100][T12750] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 166.171998][T12750] EXT4-fs (loop4): group descriptors corrupted! [ 166.557952][ T25] audit: type=1326 audit(1619675833.441:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12697 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0) 05:57:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000100)=""/13, 0xd}, {&(0x7f0000000140)=""/121, 0x79}, {&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f0000000280)=""/122, 0x7a}, {&(0x7f0000000300)=""/62, 0x3e}, {&(0x7f0000000340)=""/74, 0x4a}, {&(0x7f00000005c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/210, 0xd2}], 0x8, 0x3, 0xc) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:13 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(0x0) r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:13 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x420041, 0x80) mmap(&(0x7f0000477000/0x3000)=nil, 0x3000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6c7562653d6eff0065722c00ff3cda0a84e54717863adf79fb339ce9f4ce0d3e6ff033ab241605b00da071454f54494e695397fc74a399b9eedfbf5881067976bf95767cc16e548a57b3edb59920a7c8ac106428c7dbbce5945746c65aa35daebbbc62bc0f17d6ee8a31d978d43cdcb98dabef3413fba38674ff4969e936912676a2b7bb634e03837e11a1ad32ab2803559fbd1da9bba052b4e1e490a3cc36b9ec13c68d1ee8bea155213278"]) [ 166.644981][T12773] loop3: detected capacity change from 0 to 4096 [ 166.650288][T12776] loop4: detected capacity change from 0 to 4096 [ 166.660240][T12776] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 166.670090][T12776] EXT4-fs (loop4): group descriptors corrupted! 05:57:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 166.677807][ T25] audit: type=1326 audit(1619675833.561:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12769 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 166.702649][T12785] loop1: detected capacity change from 0 to 264192 [ 166.707657][T12780] loop2: detected capacity change from 0 to 196608 [ 166.720872][T12787] tmpfs: Unknown parameter 'lube' [ 166.726237][T12773] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 166.736029][T12773] EXT4-fs (loop3): group descriptors corrupted! 05:57:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:13 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6040000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 166.824403][T12800] loop4: detected capacity change from 0 to 4096 [ 166.880835][T12804] loop3: detected capacity change from 0 to 4096 [ 166.892464][T12800] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 166.902269][T12800] EXT4-fs (loop4): group descriptors corrupted! [ 166.902716][T12804] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 166.918294][T12804] EXT4-fs (loop3): group descriptors corrupted! [ 166.928831][T12809] loop2: detected capacity change from 0 to 197120 05:57:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 167.014751][T12818] loop3: detected capacity change from 0 to 4096 [ 167.029971][T12818] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 167.039868][T12818] EXT4-fs (loop3): group descriptors corrupted! [ 167.056575][T12823] loop4: detected capacity change from 0 to 4096 [ 167.070162][T12823] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 167.080009][T12823] EXT4-fs (loop4): group descriptors corrupted! [ 167.503508][ T25] audit: type=1326 audit(1619675834.391:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12769 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0) 05:57:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='sb=0x0000000000000100,\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file0\x00', 0x0, 0x100) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000900)={0x0}}, 0x0) r4 = socket$inet(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x4e24, @empty}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e21, @empty}, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, &(0x7f00000012c0)=0x149) r5 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000002400)=ANY=[@ANYBLOB="736563757269747900000000000000000000000000000000000000000000040000000000007afb76d70000000000000000000000000c217dc3f8208378893adedf67e69144fb1296c8758619c2954fc2336dbc51d441a1121188cfbc847758112d692e2a79474c2d19192ed35c90b2d1312960833640b39e5c740702742c831d7662a097a4ff693af04e62633934d3e1d17bd5de0087d15fdf1c1a2ea459cc"], 0x48) sendmsg$TIPC_NL_MEDIA_GET(r5, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000900)={0x0}}, 0x0) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000080)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r5, 0xc0c89425, &(0x7f00000000c0)={'\x00', r6, 0x0, {0x1, 0xfffffffa}, {0xf786, 0xd5}, 0x101, [0xe8, 0x0, 0x7, 0x40, 0x2, 0x3, 0x0, 0x10000, 0x6, 0x1ff, 0xf5, 0x4, 0x5, 0x5, 0x4000004]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f00000000c0)={"99611e961dbc649d8cd475745770654c", r6, 0x0, {0x1, 0x7fff}, {0x7500000000, 0xac0}, 0x1000, [0x3, 0x0, 0x3, 0xca92, 0x8, 0x100000000, 0x8000, 0x6, 0x8, 0x3, 0x800, 0x800, 0x8, 0x1, 0x2, 0x8c10]}) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000001400)={{r1}, r6, 0x8, @inherit={0x58, &(0x7f0000001380)={0x0, 0x2, 0x3, 0xfbc, {0x39, 0x7, 0x9, 0x3cf9, 0x101}, [0x7f, 0x5]}}, @devid}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000180)={{}, r6, 0x8, @inherit={0x70, &(0x7f0000000100)={0x1, 0x5, 0x1, 0x7ff, {0x21, 0x800, 0x8, 0x17db, 0x22}, [0x7, 0x1, 0xdbc0, 0x8, 0x4]}}, @name="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"}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:14 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:14 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(0x0) r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 167.584426][ T25] audit: type=1326 audit(1619675834.471:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12835 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001640)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16=r4, @ANYBLOB="bd7017ffdbdfa06b000011080002149ae1b57c95a5466b0000dd0100010000000000000000000000000000f7ffffff00", @ANYBLOB="e4b3fcdfaf28d2f54df0074dae8564120ea7471c8734c4922298574f4a6257e44b155e19c37e446191e681261f8b78af0cef84dce214261ca313fcce6833276cb1e4ba13668bbfeb3b5024ed222970f99e7b69a5a4df5dfe03e1ddabb042e3695f67e387c26fa634b4d9bfda45b262ff431c6d56785cf7fed495c7f6bc172da0e3349c47edadc95de0995d0500000049c46e0d364800bdfa1bac1bbd842f1dbd4cf73f2a5311fa106c0c61b59bfa82276f2a1aadff1ad04e31a1ad41059976b940f5452f93e868863e967bd1ffb3e1515b9853f730d800a841d1cb0c79e8435815ff0f00"/243], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001600)=ANY=[@ANYRESOCT=r2, @ANYRES16=r4, @ANYRESDEC=r1], 0x1d4}, 0x1, 0x0, 0x0, 0x4008000}, 0x2400c014) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000580)={{}, 0x0, 0x12, @unused=[0x9, 0x0, 0x7f, 0x20], @devid=r1}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000040)={{}, {@val={r1}, @actul_num={@void, 0x1, 0x4d}}}) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000100)={r1, 0x2, 0x1, [0x7a, 0x6, 0x9c00, 0x0, 0x6], [0x3, 0x6, 0xa3fb, 0x2, 0x9, 0x8001, 0x7f, 0x8001, 0x7, 0x7, 0x1, 0xe, 0x0, 0x6, 0x0, 0xfffffffffffffff7, 0x7ca7, 0x6, 0x7b, 0x1, 0x9, 0x1, 0x2, 0x3ff, 0xaec, 0x4, 0x3ff, 0xeff8, 0x401, 0xfff, 0x6, 0x7fffffff, 0x7f, 0x1, 0x1, 0x1, 0x3, 0x4, 0x1f, 0xa75e, 0xffffffffffffffff, 0x81, 0xfff, 0x80000001, 0x3, 0x40, 0x8, 0x9, 0x7, 0x4, 0xe4ce, 0x5, 0x3, 0x7, 0x9, 0x3, 0x2, 0xa97, 0x100000001, 0x9, 0xfffffffffffffec9, 0x3, 0x10001, 0xdc, 0x1, 0x7ff, 0x4, 0xffffffffffffff81, 0x4419, 0x12, 0x1000000000000000, 0x8, 0x8, 0x8b, 0x3ff, 0x7, 0x800, 0xc28c, 0x7, 0x1, 0xf4, 0x66f, 0x0, 0x6, 0x5, 0x2, 0x1, 0xfffffffffffffffb, 0x3ff, 0x2, 0x800, 0xfffc000000000000, 0x3, 0x2c96, 0x5, 0xffffffffffffc042, 0xfc20, 0x2e63, 0x20, 0x8, 0x6, 0x1, 0x81, 0xfffffffffffffc01, 0x8, 0x4521b3ae, 0x4, 0x6, 0x8, 0x6, 0x9, 0x6, 0x2, 0x6, 0x8, 0x9, 0x6, 0x10001, 0x80, 0x4, 0x4]}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000000)={0xc, 0x2, {0xffffffff, @struct={0xeca2, 0xfffffff9}, 0x0, 0x9, 0x0, 0x9, 0x3, 0x101, 0xc2b, @struct={0x6, 0x8}, 0x1e8, 0x6, [0x80, 0x2, 0x7fff, 0x3f, 0x1f, 0x6]}, {0x20, @struct={0x8, 0x2}, r1, 0x8001, 0x878, 0x5, 0x8, 0x40, 0xc3, @struct, 0x3ff, 0x1, [0xffff, 0x2, 0x2, 0x7fff, 0x7, 0x6]}, {0x0, @usage=0x7f, 0x0, 0x80, 0x7, 0x100000001, 0x2, 0x200, 0x24, @struct={0x7, 0x6}, 0x7, 0x9, [0x80, 0x5, 0x1b4, 0x7, 0x1000, 0x8000]}, {0x1, 0x100000001, 0x7}}) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000340)={r1, 0x7f, 0x0, [0xccde, 0x2, 0xfffffffffffffff7, 0x6, 0x1], [0x10001, 0x4, 0x0, 0xfffffffffffffff8, 0x5, 0xfa, 0x80000001, 0x9, 0x1e3517a6, 0x2e4, 0x3, 0x1f, 0x7f, 0x9, 0x396e, 0x1, 0x4, 0x8, 0x6, 0xfffffffffffff801, 0x2, 0x3406, 0x0, 0x0, 0x3, 0x80000000, 0x5, 0x0, 0x8, 0x4, 0x7f, 0x3, 0x6, 0x200, 0x8000000080, 0x4, 0x2, 0x1dd, 0x0, 0x7, 0x6, 0xffff, 0x100, 0x9, 0x3, 0x1, 0x7, 0x6, 0x5e, 0x3f, 0x0, 0x6, 0x7ff, 0x6, 0x1, 0xffffffff, 0x1ff, 0x9, 0x9, 0x20, 0x56, 0xc67b, 0x3, 0x5cf, 0x0, 0x7825, 0xc8d, 0x40, 0x9, 0x572, 0x3, 0x4, 0x6, 0x0, 0x2, 0x0, 0x40, 0xfff, 0xf5, 0x3ff, 0x1f, 0x3, 0x8000, 0x1, 0x4864, 0x31fc, 0x6, 0x0, 0x1, 0xd607, 0xfff, 0xbd, 0x1, 0x10000, 0x0, 0x1, 0xffffffffcdc5e323, 0x0, 0x6, 0x1, 0x1, 0x6, 0x9, 0x4, 0xa5, 0x3, 0x8, 0x7f, 0x20, 0x687f, 0x80000001, 0x5, 0xa04d, 0xffff, 0x69db, 0xa1c1, 0x100000001, 0x6, 0x2, 0x100, 0x1f]}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000009c0)={0x8, 0x3, {0xf8, @struct={0x0, 0x9}, 0x0, 0x2, 0x0, 0x1, 0x3, 0x7fffffff, 0x90, @usage=0x400, 0x1000, 0x9, [0xfa, 0x6, 0xf4e3, 0x6c, 0x1f]}, {0x4608, @struct={0x3ff, 0x1}, 0x0, 0x7, 0x0, 0x81, 0x2, 0x5, 0x4, @struct={0x3}, 0xfff, 0xcdf, [0x9, 0xc8000000, 0x9, 0x4, 0xffffffffffffff81]}, {0x1, @usage=0x70, r1, 0x8, 0x8, 0x4, 0x7, 0x6, 0x58, @struct={0x29, 0x1ff}, 0xfffff800, 0x5, [0xff, 0x1, 0x9, 0x6332, 0x6, 0xa3c]}, {0x3, 0x2, 0x2}}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0xc42, 0x0) mknodat$null(r5, &(0x7f0000000140)='./file0\x00', 0x20, 0x103) [ 167.626074][T12843] loop2: detected capacity change from 0 to 229376 [ 167.637198][T12846] loop4: detected capacity change from 0 to 4096 [ 167.644271][T12845] loop3: detected capacity change from 0 to 4096 05:57:14 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 167.676854][T12846] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 167.687192][T12846] EXT4-fs (loop4): group descriptors corrupted! [ 167.689100][T12845] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 167.703708][T12845] EXT4-fs (loop3): group descriptors corrupted! 05:57:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) close(r0) fremovexattr(r0, &(0x7f0000000100)=@random={'osx.', '\x00'}) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000140)=0x166, 0x4) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) [ 167.740616][T12859] device lo entered promiscuous mode [ 167.746468][T12859] Y­4`Ò˜: renamed from lo 05:57:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 167.785701][T12860] loop2: detected capacity change from 0 to 262144 [ 167.831749][T12874] loop1: detected capacity change from 0 to 264192 05:57:14 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 167.876733][T12878] loop4: detected capacity change from 0 to 4096 [ 167.902319][T12884] loop3: detected capacity change from 0 to 4096 [ 167.909325][T12878] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 167.919278][T12878] EXT4-fs (loop4): group descriptors corrupted! [ 167.926855][T12884] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 167.937444][T12884] EXT4-fs (loop3): group descriptors corrupted! [ 167.995358][T12897] loop2: detected capacity change from 0 to 264192 05:57:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0) 05:57:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:15 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 168.517393][T12912] loop3: detected capacity change from 0 to 4096 [ 168.523879][T12913] loop4: detected capacity change from 0 to 4096 [ 168.531087][T12917] loop2: detected capacity change from 0 to 264192 [ 168.557844][T12912] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 168.567931][T12912] EXT4-fs (loop3): group descriptors corrupted! [ 168.575244][T12913] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 168.585028][T12913] EXT4-fs (loop4): group descriptors corrupted! 05:57:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_STATX={0x15, 0x5, 0x0, r0, &(0x7f0000000100), &(0x7f0000000200)='./file0\x00', 0x1, 0x1000, 0x1}, 0x80000001) 05:57:15 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(0x0, 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:15 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xb000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00000a4000/0x4000)=nil, 0x4000, 0x1800003, 0x30, r0, 0xf971d000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f00000027c0)=[{&(0x7f0000000180)=""/50, 0x32}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/4086, 0xff6}, {&(0x7f00000021c0)=""/159, 0x9f}, {&(0x7f0000002280)=""/163, 0xa3}, {&(0x7f0000002340)=""/134, 0x86}, {&(0x7f0000002400)=""/224, 0xe0}, {&(0x7f0000002500)=""/234, 0xea}, {&(0x7f0000002600)=""/225, 0xe1}, {&(0x7f0000002700)=""/161, 0xa1}], 0xa, 0xd9f, 0x2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="68756700040000000000086e"]) 05:57:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:15 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xc000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 168.717007][T12937] loop2: detected capacity change from 0 to 264192 [ 168.759372][T12947] tmpfs: Unknown parameter 'hug' [ 168.776540][T12949] loop4: detected capacity change from 0 to 4096 [ 168.786682][T12950] loop3: detected capacity change from 0 to 4096 [ 168.816665][T12950] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 168.826504][T12950] EXT4-fs (loop3): group descriptors corrupted! [ 168.829918][T12962] loop2: detected capacity change from 0 to 264192 [ 168.841389][T12949] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 168.851510][T12949] EXT4-fs (loop4): group descriptors corrupted! [ 168.872938][T12966] loop1: detected capacity change from 0 to 264192 05:57:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0) 05:57:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x40, 0x0) fstat(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r3) setresuid(0x0, r3, 0x0) mount$9p_virtio(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x3808804, &(0x7f0000000340)={'trans=virtio,', {[{@access_uid={'access', 0x3d, r1}}, {@cache_none}, {@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}, {@loose}, {@posixacl}, {@nodevmap}, {@cache_loose}, {@cache_none}], [{@euid_eq={'euid', 0x3d, r3}}, {@fowner_gt={'fowner>', 0xee00}}, {@uid_lt}, {@permit_directio}, {@smackfsfloor}]}}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="687567653d6ee57665722800"]) socket$inet6(0xa, 0x80008, 0x5) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000440)={@desc={0x1, 0x0, @desc1}, 0x21, 0x0, '\x00', @c}) 05:57:16 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xd000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:16 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(0x0, 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 169.348205][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 169.348219][ T25] audit: type=1326 audit(1619675836.231:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12914 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 169.432928][ T25] audit: type=1326 audit(1619675836.321:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12983 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 169.457015][T12987] loop3: detected capacity change from 0 to 4096 [ 169.463882][T12986] loop2: detected capacity change from 0 to 264192 [ 169.465505][T12990] loop1: detected capacity change from 0 to 264192 05:57:16 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xe000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 169.477063][T12994] loop4: detected capacity change from 0 to 4096 [ 169.480078][T12994] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 169.480096][T12994] EXT4-fs (loop4): group descriptors corrupted! [ 169.498585][T12987] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 169.498681][T12987] EXT4-fs (loop3): group descriptors corrupted! 05:57:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000", 0x8, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 169.558170][T13018] loop2: detected capacity change from 0 to 264192 05:57:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setfsuid(0x0) setresuid(0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000001300)) stat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() rt_sigqueueinfo(r2, 0x27, &(0x7f0000000140)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001bc0)={0x0, 0x0, 0x0}, &(0x7f0000001c00)=0xc) r5 = syz_open_dev$vcsn(&(0x7f0000000000), 0x40, 0x0) fstat(r5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r6) setresuid(0x0, r6, 0x0) r7 = socket(0x400000000000010, 0x802, 0x0) write(r7, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) lstat(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$netlink(r0, &(0x7f0000002b80)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000002a40)=[{&(0x7f0000002bc0)={0x11e0, 0x10, 0x4, 0x70bd2d, 0x25dfdbff, "", [@typed={0x8, 0x4f, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x39}}, @typed={0xc, 0x44, 0x0, 0x0, @u64=0xffffffffffff5667}, @nested={0x1108, 0x4, 0x0, 0x1, [@generic="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", @generic="db81c4812c845cb018f8a747771965f51b2d86d010d7cf5502319f5dd24b2273b63ba624302d5ef8d147b0f5872c876b37007fe739fd5172cf1d48fd1384c71965c0947e6af300d168fd07a7c594bb90200f7b", @typed={0x8, 0x73, 0x0, 0x0, @uid=r8}, @typed={0x8, 0x90, 0x0, 0x0, @u32=0x3ff}, @generic="64db75bd213846c2720787f2c15cf161c2b162da81fe0aeb75c637b0243eecd7f326620f49fac2bdae31ff6ae80afaa20926c12f2f1ecdc36edf4bddbb1e409f03351f3e7f14d8f15655244d616b9b3dfc149b9a8c2760a41f86b80626936ea118d2bf9e65c7a4a5b9f66a8492f48476456b8ae02f35acebe87366dfe4648e5b3cbc510fc985e589863cd5801c864330bc17922b88e07b95b22ad53fcb6094b855"]}, @generic="aee9ab22384f3f8b1e4bbe9cb6976788ed34d6e2862bbb01ac292b463e2f40f6956695991acd093eac7e98db11245afe2d577c1d9e9e3532fc81617ce6e8f661ed36d415ae31d26b21360bae64afe1037f2b8de24a3b41994eaa4f552ebefcbfdeb6a3a7fe2b73834255b65cd911b24ab9ea640b051d77df62483b46101c7a1425eb2f1e1d1ecaa5eae6790b1d834bcff58286ed6304399866bdde9df5821b9be5f1eb7e82ae9bfa115d0b0559e45afd07a1"]}, 0x11e0}, {&(0x7f00000001c0)=ANY=[@ANYBLOB="580500003a00000126bd7000fedbdf251820de1417501b9b6e419a5d75f7a49e8eaef71fa9dc70b35beb898da91e14c4928a7944ba4408005c00ac1414aaec004580a4171e2a0263a895266cd0befa2a016929b184457f08005400", @ANYRES32=0x0, @ANYBLOB='\b\x00{\x00', @ANYRES32=0x0, @ANYBLOB="23c01bf6ba7a26e0cd231e32811e53a34b55a8a4b9386f7b23432384a59bbe51afa53e795b571890bf62443176e8be3b4b6b2fc7e66d2581eaa96550c9cb3fc304b35dd8a89847d039574b2ef8934d2771d54090c1c04d0eeeae70f3979f10a8a4ad3d5fedd2c926922b1d6f0f2950907877536aa12c383c9c1329456d6b2af40e2ed72b2bd8f08c56021be56257d4903113c2e83ad9804ab93c04083dc0d560bdcf4efb54c91af0c733dce0e3ce6c76302dc8755855df9ee665f4df69e74899b75e1608007700ac1414bb0e045f800f65f885ed40978eaee1932f7cd85b8c4ea27bdc8b6d90fcc70b9faacf4fd6eb0efd4c09262f4c6d9b0c2e3477bb01ac2403afdf66b45731bd475611520964a57e5e4d01d2d0ff769fbc19d88a193fb68c5bee52bc1136693cebbd8f9cad94865d707d67b02862540d784b979b25de7971956fd494e457fcf7b23dd776bbdade88680a23eae016ef0b0aae8c27963f9d3b1c28ef931549abdad8dce407d31b2e6e0858d99ca5e83d55b6b03815758b8848beb419bea436f573d725f79d6b50bbd9c9c97a80c6d8cf02655521f6f3bb4283fbb8e1ab065923ff4a08006800", @ANYRES32=r1, @ANYRES16, @ANYRES32=0xee01, @ANYBLOB="7c0017009f874ce8c468bd5d172fcab14be99a6b21d99bed201ed91bbf97cf7e500018cb83d911c2fadb82554b8f4f7d24fc1a145c20628c42c1c81ace0a6918ffc6e4b426cf4d33660fa80fd14752b55c2345b2b55e954b5aee3829434f8e51628d5108e29147f0323eae42cc08ef3e79d094065b760ffaa19c32b11ad07059950f7d29dd11afdd235092124e2e3232c354914de15aa24aea2dda6b3c1d0e5bef925679d93720bf0aca6927fe1b0002e0b44f8cfb1c8dc156ec072fcb2354f031b8772caf0a5a3b4013e7bdb0d648b9960463e7313917ce7ed080b52a67344aa88e436369bc41bebe0c508ffa07fd7893832dc7b9701a8f6441a0f7092cbbc5d4005bae9b46fce80c2eef098ed880dc48214882370b586bf8e4a1121d774b04a70864504ca19018edae1d37650cabecc15a5bb23a99c61dd31630c32f3fd58076d2f0785be30c0060007300000000000000643eb7752f8eba219afc6915b5b1df8a196d2cfcd7316833fe308bb868fc545cda86ffc97e1777bc1fa54c11171ae53fc77f202b2379bd3a8ddc76dfe37fdd99ef4f2c27b84c7179e0ec3b3317b381536ac528ccb9bcef76efc7f741e749225ed8e17296b726e05926e5fcd0b0711952e3b96ca2990fca0f41df37d2f53a52301ff26b3cfddef93440801020cc2c172aaa58920e6f0866d7fd4bbc4259e7a6fb62073f331c72041bccec7bd22fbfc55ab4781d01ca27158fd9257715c7c3c1db30555eafce74978aa5443a18b65fc51be3ebd758f689b692facd286933652ce07134042579e4f5a19e241731741d419992bb014cf35a748d091625fd0f9d7e55a87e5453ba90ff291e5cc7c329cafea9d84fca7cda40731829ac852f2f8b3139afd6e9f4630f8185d747b8797958f49a5ce9e0a4ba7ee8c01a1c8032e506ac3347fb70ac234935eb4826353439bd3501e2864e98cc6718167f82a504e4e0bccd0a5d01ac21b49d09c44ad6879b2f6ce8cd0cc72182f65896615ebf7b501dfe8adcfb2e1e48381ff0e6b0188ae4426e209e6fc1338a8121dab26bb65af295e776a0695f9abc50d782dd0164b2102261234036fc2753a8c708089485abcd89809b71f1fbdf8dbc882fd15008d6a89800000c00578008007400", @ANYRES32=r0, @ANYBLOB="08091a001b0000000000e112325b55dfc7c875e9a1cd6bf5fd6ea821a97781b696e38cdbee622f777dfccb2fccb2ad1507d237a5e022217b55afdda3938cae146c25f5d1f9deeb51c965a94ec5cb"], 0x558}, {&(0x7f0000001a40)={0xc8, 0x34, 0x20, 0x70bd25, 0x25dfdbff, "", [@nested={0xb7, 0x60, 0x0, 0x1, [@generic="ff844378db254a1c511be077e0c2e04f708f50143f6b7f9489cdad53f5490e6d79ca47556273e8c2112845b6e73f63268fecebd61aef7029530d08c0e2e25d6fec6a5b18b7219005ab28ef186ebfb01e2ee097214dfafbed1bafa6e1fada506092ba4f8bbd8e8e3028432dd8179d2a39188c56bb8b1f46893e0128e75d872eae2a05ef0285251e02dcb2e210f824099ac76faf35501c2882aca22c8d3dd7966ad1eb8184c81130097b8a278d0c6341aebff2f7"]}]}, 0xc8}, {&(0x7f0000001b40)={0x30, 0x27, 0x8, 0x70bd26, 0x25dfdbfb, "", [@typed={0x8, 0x51, 0x0, 0x0, @pid=r2}, @typed={0xa, 0x7e, 0x0, 0x0, @str='tmpfs\x00'}, @nested={0xc, 0x47, 0x0, 0x1, [@typed={0x8, 0x46, 0x0, 0x0, @ipv4=@multicast1}]}]}, 0x30}, {&(0x7f0000001c40)={0x144, 0x2c, 0x100, 0x70bd2a, 0x25dfdbff, "", [@nested={0x12c, 0x23, 0x0, 0x1, [@generic="9ec218fe196367b2bb9df830a896c5f70368bb625a8c547f96774727d19895b65b5b0bfd3e37f5f1e1230fad9c207236be5c23cc8ced43cf451e3a", @typed={0xa, 0x4e, 0x0, 0x0, @str='tmpfs\x00'}, @typed={0x8, 0x43, 0x0, 0x0, @pid}, @generic="d49b1b1753f2b1da1497dc400621ef31041971728fcae475421e120a79ea96af3ddbfdef29b0ffadbfa3cbae8bf2ba0d7d999e56bb40ada885878d9a330231692026fb898ca1e456174d175428a35393359f255ab655325a9d775b581d2d2579fff1fc36080c7febe81bb81a7d906e13a62c4d84ce95146a91439317a2a0af2099d801e16567a1696624bffe90f2b9dfdb55ecd2b333bdfc23fb2cbb9bc582e9ccb21d6be6fce3f33740a5c35326136a10dc0a85f39c39c0cb40f92aa9a286272554afbd00c3d572f98a27124c8e2da174", @typed={0x8, 0x11, 0x0, 0x0, @pid=r3}]}, @typed={0x8, 0x95, 0x0, 0x0, @pid}]}, 0x144}, {&(0x7f0000001f00)={0x43c, 0x34, 0x20, 0x70bd25, 0x25dfdbfb, "", [@generic="4943f79f4721691f9895efd6b10c4a3e14ecc75adeaf8ccc6836300816cbfa77d4a33dd5e6ca7276a99fd92a7cfce5294158437272a83f99ace21664a9dd5d79cc694aa4970d4b28be4363f6afb1c1bd2be776c2a848a0365cb83a4964ab862ac20fb382a7da20e5", @generic="7cede6710e8ae555cdaaf2d71e782fd649d9e32438fe6c3f6fa4112f9cfc41eb14aefb07dbac5b293f95076c5d52e861b58e65474791e93bea8370d6b976f2bde6a3ffa682361a30c1c9292c4766c0b05392e9a6243cc08fc4288fe38576b5119906d553666e1552d9ee1e99c7a17f6bb368ecf4dc62282dc2432755e08523457d6885ad9035c6b0d265790d2e7a599d93af85c6bc1a372cc8c135ec86b88b98036981275978f7df17117ddfc5436521dd1a8051697890d1430458bc915856cd11040bf3c1dffd32ac7244708a5ff5a7b5eb059cbfa799a31bf15c791435c7f96a575ab87111a8aa51c5", @nested={0xe2, 0x3a, 0x0, 0x1, [@typed={0x8, 0x1f, 0x0, 0x0, @u32=0x1}, @generic="8dbd3f7461e79e7e4257a5bd9b8ff695188089d0dc5cf84473b962eabd3a3b8515c06713f7a5643b229ca26ae155a55308b3466dbb806c4e4f1f6ac20e502f624903b97af2847de6c4778c7bb86938c6c932d361784ac62068a115bb34530d48fcbf20b6e16ebedb6288c4cdc3d177619bd0ee9e7008657abeea52af4cdf2c1d08eb81e8579165bc90a83919a14578d12ff05a75eba033822a169d5784f7bf4742497856efd66152f7bea686c0cebb9d239177260aeb5f602bed338f843068b2641abefa23c5e2bd7256a003f848", @typed={0x8, 0x46, 0x0, 0x0, @uid=r6}]}, @generic="507b108c24caf838a9ded155cfaadb48af377466de6413b11e1a9eb4bc2314276239f4086fb4b68219c478097cb8dcc7873bfae9ff18f747972c6f1533ec774140c80513af7ad5fd", @nested={0xc, 0x73, 0x0, 0x1, [@typed={0x8, 0x2c, 0x0, 0x0, @fd=r7}]}, @typed={0x8, 0x55, 0x0, 0x0, @u32=0x1}, @nested={0x18d, 0x7f, 0x0, 0x1, [@typed={0xc, 0x4a, 0x0, 0x0, @u64=0x100000001}, @generic="afeae8fa05e9f388a29ccee7f878872f8d4d0bbe182aa7b7a9f9267a1cb7cd14223fdbd3c9aa30fadfc19943dd6a8b716ab89736f3e44391c907c3de319d16dc894227986e5691591de8484c6c93e13abad67f7cf4f3e99e691bb281957ab68101a1a67f9a42780ec26ceda7ae87a438322ac9ae", @generic="6e3b5ff06525e878be37d54b8be13399d5a6a76c381a591c7971fa4699c03e2c20ae402fa01a15cf95f4187a23", @generic="73303ebbadc466bd2ba8e359ad1f281a7bbfe5f67c6cc2891d42555c9bc09bdbd46cf1a3c500d0c374afc41deb841564e0743fcf4d35eabadfa9e637f631d57c2366f187176aa064a8a68d12415b1bc7b910210a77cbe3a4e0827b79b9217cb282e5df18e26ece0a4d4824ad1891081d0c0cca5948c76aad95ad4e6850eb8665affe30cc0d6cd91f77cf42faa67700f3f68cbe84d3b2a7728152d7db534cfe5c02ab1fd0e695436e5f3b642e7ee61daba3a1a9099512a866532720cd075c74326d55de128a3e28f57227fd8b968ab87cd14b9716ac56fe6a", @typed={0x4, 0x8f}]}, @typed={0x8, 0x40, 0x0, 0x0, @uid=r8}]}, 0x43c}, {&(0x7f0000000780)={0x194, 0x80, 0x100, 0x70bd25, 0x25dfdbff, "", [@nested={0x95, 0x79, 0x0, 0x1, [@typed={0x8, 0x3c, 0x0, 0x0, @pid}, @generic="3b9c67261cc57f633952aacd1602c0b1064141ad68391e604d8ec1ab4e9ac3291eedb786af140579618e40cd24a9203a8e7a64836576b787235feb938bcccc6f96eb37f14950bcf6ac413297b81d49245f3368d9a54e3f6f90020e99", @typed={0x8, 0x65, 0x0, 0x0, @ipv4=@remote}, @typed={0xc, 0x5, 0x0, 0x0, @u64=0x9}, @typed={0x8, 0x1a, 0x0, 0x0, @pid}, @generic="4732c02b513c7ebfaafe197b78be4989a3"]}, @nested={0xec, 0x64, 0x0, 0x1, [@generic="96aa6877d8afc01e747ab3f9f1a9fcc0d2bbd1b5a305433018190310a3bb82f599314e0178404320215f0a4aff5003f22ff505bc2a9df60c9c2f900309dc260c56034a441c26ea376ac4a0a8ed80b4942c9b3e030156f5d3871b956cb7bbb6f0d0f8fc3743fb88b6222939236d42c6c7de9c8b57a58edc78edae82787b8af781fa204fc334aa16068c90cc2fa476ca36337bea962c3d7697c2ffee428f74", @generic="29b767e9742e30d5d81b103de40042f73df03c85e5b21899b8586cbb2e85430982ca6d97b42a0d3389c50861830d5aaca9485534b03f1a17b78d9b8963c3ac166dd09b7fa8", @generic="d4186bb61f"]}]}, 0x194}, {&(0x7f0000002500)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="08002a00018000000c1f9500ffffff7f000000000c003700080000000000000008003c00", @ANYRES32=0x0, @ANYBLOB="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"], 0x4d8}, {&(0x7f0000000a00)=ANY=[@ANYBLOB="300000001e00d93e38b340bf000325bd7000fcdb0000000000000000b4d1fa8c7f92839f5e8a006121ea2b2b00140056c6bfb51d2aa4f6f058667c7b2bae584b780238e739275c06ea67a21e657955bff06dfe0ab99f51145e5e44d7afbdcd546d379ec302f1eb3bbda73fada53bf002029da407b2bcea034cb3b3cc555c7f4b2fc6cc18fe610200000000000000f73f7c8d"], 0x30}], 0x9, &(0x7f00000009c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}], 0x40, 0x4000810}, 0x804) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="68757cda087ca0661405f843a3bf5bfa5bb767653d6e657665722c00"]) [ 169.622052][T13024] loop3: detected capacity change from 0 to 4096 05:57:16 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 169.691232][T13026] loop4: detected capacity change from 0 to 4096 [ 169.703815][T13024] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 169.713646][T13024] EXT4-fs (loop3): group descriptors corrupted! [ 169.735067][T13026] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 169.745669][T13026] EXT4-fs (loop4): group descriptors corrupted! 05:57:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r1, 0x5411, &(0x7f00000000c0)={'lo\x00', @ifru_addrs=@can}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) [ 169.815695][T13038] loop2: detected capacity change from 0 to 264192 05:57:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0) 05:57:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000", 0x8, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:17 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) tee(r0, 0xffffffffffffffff, 0xff, 0xd) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:17 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(0x0, 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 170.264806][ T25] audit: type=1326 audit(1619675837.151:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12983 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 170.345836][T13067] loop1: detected capacity change from 0 to 264192 [ 170.391578][ T25] audit: type=1326 audit(1619675837.281:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13065 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 170.417396][T13072] loop2: detected capacity change from 0 to 264192 [ 170.418935][T13074] loop4: detected capacity change from 0 to 4096 [ 170.424247][T13071] loop3: detected capacity change from 0 to 4096 05:57:17 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x11000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) r1 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) preadv(r1, &(0x7f0000000280)=[{&(0x7f0000000100)=""/117, 0x75}, {&(0x7f0000000180)=""/27, 0x1b}, {&(0x7f00000001c0)=""/179, 0xb3}], 0x3, 0xffff, 0xb39) [ 170.437185][T13074] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 170.447019][T13074] EXT4-fs (loop4): group descriptors corrupted! [ 170.463263][T13071] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 170.473098][T13071] EXT4-fs (loop3): group descriptors corrupted! 05:57:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000", 0x8, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) preadv(r2, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/176, 0xb0}], 0x2, 0x800, 0x9) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000140), 0xffffffffffff8000, 0x8000) mount_setattr(r1, &(0x7f0000000100)='./file0\x00', 0x100, &(0x7f0000000180)={0x87, 0x4, 0x180000, {r3}}, 0x20) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f000041e000/0x4000)=nil, 0x4000, 0x1, 0x80010, r0, 0x71d22000) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) [ 170.576868][T13097] loop4: detected capacity change from 0 to 4096 [ 170.605727][T13099] loop2: detected capacity change from 0 to 264192 05:57:17 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x12000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 170.621022][T13097] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 170.630863][T13097] EXT4-fs (loop4): group descriptors corrupted! [ 170.644482][T13102] loop3: detected capacity change from 0 to 4096 [ 170.707954][T13102] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 170.717746][T13102] EXT4-fs (loop3): group descriptors corrupted! 05:57:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0) 05:57:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = signalfd(r0, &(0x7f0000000180)={[0x2]}, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0), 0x1, 0x0) r4 = dup(r0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = socket(0x400000000000010, 0x802, 0x0) write(r6, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r7 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r8 = fcntl$dupfd(r0, 0x0, r0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x6, 0x9, r0, &(0x7f0000000100)="3edc0623ef09391491e713a66397876d441726", 0x13, 0x3, 0x0, 0x1}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2, 0x5, r1, &(0x7f00000001c0)="97424afb34a284fc9354ebbc440231a10e10e114f4c740931a1aa0edaecb948c1f9c090d6c17a9ec90353e38508d2c7ac5f21b228d42d1e8e2308200cd55714ddaf920d8db1af453f29ecb22aef26b015123e63685e75954ca2543b872bc2a26ea68f687329f785876c7ae2dad763845d4ca15be242c565fa902fbadef56b97652cec4d2a3118735e6eee9510b4716d9659ef49b663c7449db3747760af40f38ae825e6716940d63a07e90cf3662a281ee417d5f9f011d210b31", 0xba, 0x0, 0x0, 0x1, r0}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2, 0x8, r2, &(0x7f00000002c0)="912f910a6b24e292626e40f8ec594701ab9064d1b0ddc66e91dcf1051300846364dde55557cd87d83bff7f4aadb50ff6d77d35a92158958a6ed59432aed82e35054b3f497c326d1074a3d47e168860ff7a92f1f704e219eda3dcbcb9d5e030569977e9108aa3945c9c954192ec72611dc2f4ce3f74a4c41c066571ace8f183b0f35d27d4db2d6289d87664d79d7f00fdbe486f57731c414646a78943990e00c82aa65d37d6bfb9076b686d9ffe400de798f2f801cc0bace4efd70c8d2048319467ace9fe2d4bee4cbc96fcf0da17eb8f6ca7597a4c84f321cd17d740f50f5041367520a8c4be740097e681a97dc178458e0cf7", 0xf3, 0x80, 0x0, 0x2, r3}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x8, 0xfff8, r0, &(0x7f0000000440)="5e3da5ac16c4eecdfc1f133d2fffdbb3dcff3169f463f2b4b59ca1466b04322cb6c7bb04ca32c7cf288615a8", 0x2c, 0x6, 0x0, 0x8bc3ec2aeb335afd}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x6967, r0, &(0x7f00000004c0)="f4441991b3dfa6d5615e702fd9b5ee8128072b17c4d762b57756ebcf3434e5f2ea5f4aaf96ce71d3add733c86f9198fa958962", 0x33, 0x81, 0x0, 0x3, r4}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x5, 0x8001, r0, &(0x7f0000000540)="922a0b72f9e2877c468e02b5fb059ad5bff23b5f33069d9179cc59882b53f8a41a507b2ebdbccf1678c75472267d940a81a0ccecfe11d18dca03749a168fc61e16fb97cfe5d9be3f7368a4f8aeaa6930d435bc164a13f79f2d4afa61a02f5a0851130518ca72a64ffd9d3b991d4addf629753191c6cb895bf205", 0x7a, 0x1, 0x0, 0x2, r5}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x5, 0xffff, r6, &(0x7f0000000600)="aae836081143be211bf0f4e009c34f8341743c7500b42380ac9a129ff6e6d56ac6347af99c77bc64c681176a66f5497960d50ef4852146847ea8b4b34a98bfb22fb849f54219e973854b45dfe9e50d23b938fcc064d79ca7c22a06c7a1738353", 0x60, 0x8f7f, 0x0, 0x1, r7}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x8, 0x1, r0, &(0x7f00000006c0)="bb4593adca391fb761bf9cce901ed021b197da34e55197a00802139dd5b60b55d6624dfc29a630501cba460241d4933379d9a3b2c6b180197f872329f2e070ef1d30df28eccb2a55e896efa1e79571165e16871c2987dac7a511ab835a6fcac83b925503ab52fc18a3784687937f41589ea1aaf48bc0e76150b854ab1a878d1cde2ee0465e6cf37331d707564955e0309720efc7874aeec388dd61e2", 0x9c, 0xfff, 0x0, 0x3, r8}]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000bd068353cb7b0475"]) 05:57:18 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x18000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:18 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(0x0, 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 171.225612][ T25] audit: type=1326 audit(1619675838.111:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13065 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 171.305844][T13132] loop2: detected capacity change from 0 to 264192 [ 171.321249][T13135] loop3: detected capacity change from 0 to 4096 [ 171.323254][T13133] loop4: detected capacity change from 0 to 4096 05:57:18 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x19000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 171.338115][ T25] audit: type=1326 audit(1619675838.231:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13128 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 171.362507][T13133] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 171.372491][T13133] EXT4-fs (loop4): group descriptors corrupted! [ 171.379832][T13141] loop1: detected capacity change from 0 to 264192 [ 171.392890][T13135] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 171.402647][T13135] EXT4-fs (loop3): group descriptors corrupted! 05:57:18 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x5]}, 0x8, 0x180800) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x482, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000140)='huge=never', &(0x7f0000000180)='./file0\x00', r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x514a, &(0x7f0000000440)={0x0, 0xf302, 0x8, 0x3, 0x377, 0x0, r2}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f000055c000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000240)) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r3, 0x8008f511, &(0x7f0000000340)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0206ed7277c6cea0cfb9b84e40000000000000"]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x80440, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0), 0x2001, 0x0) r7 = openat(r6, &(0x7f0000000140)='./file0\x00', 0x511303, 0x122) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r4, 0x40046721, &(0x7f0000000380)={r7}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f0000000200)) 05:57:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000", 0x8, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:18 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(0x0, 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 171.483220][T13160] tmpfs: Unknown parameter 'írwÆΠϹ¸N@' [ 171.489273][T13157] loop2: detected capacity change from 0 to 264192 [ 171.495604][T13160] tmpfs: Unknown parameter 'írwÆΠϹ¸N@' [ 171.509241][T13166] loop4: detected capacity change from 0 to 4096 05:57:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 171.535523][T13166] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 171.545446][T13166] EXT4-fs (loop4): group descriptors corrupted! 05:57:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000", 0x8, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) [ 171.576822][T13177] loop1: detected capacity change from 0 to 264192 [ 171.623778][T13181] loop3: detected capacity change from 0 to 4096 [ 171.652110][T13188] loop4: detected capacity change from 0 to 4096 [ 171.666522][T13181] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 171.676300][T13181] EXT4-fs (loop3): group descriptors corrupted! [ 171.676398][T13188] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 171.692415][T13188] EXT4-fs (loop4): group descriptors corrupted! [ 172.154526][ T25] audit: type=1326 audit(1619675839.041:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13128 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x9000000, 0x0, 0x0, 0x0, 0x0) 05:57:19 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x20000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:19 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(0x0, 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = dup3(0xffffffffffffffff, r0, 0x80000) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r2, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f00000014c0)={0x28, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x9, 0x7b}}}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x200008d0) ftruncate(r1, 0xfffffffffffffffc) preadv(r0, &(0x7f0000001740)=[{&(0x7f0000000100)=""/137, 0x89}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/89, 0x59}, {&(0x7f0000001900)=""/208, 0xd0}, {&(0x7f0000001340)=""/247, 0xf7}, {&(0x7f0000001240)=""/157, 0x9d}, {&(0x7f0000001500)=""/241, 0xf1}, {&(0x7f0000001600)=""/200, 0xc8}, {&(0x7f0000001700)=""/28, 0x1c}], 0x9, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="68756765396164766973652c005980c1efcffe7c52408342993585725bb4fe4db7a0c74cb9bdb5087d190111010100003761bdb699daba6965f3a5b4aef6f261d0165a581ef1f060cf53f0086d960358c62f41282969da7fb773"]) 05:57:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000", 0x8, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 172.245036][T13216] tmpfs: Unknown parameter 'huge9advise' [ 172.251019][T13214] loop3: detected capacity change from 0 to 4096 [ 172.257390][ T25] audit: type=1326 audit(1619675839.141:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13211 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 172.257762][T13217] loop4: detected capacity change from 0 to 4096 [ 172.282528][T13213] loop2: detected capacity change from 0 to 264192 05:57:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:19 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x20100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 172.294024][T13217] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 172.303844][T13217] EXT4-fs (loop4): group descriptors corrupted! [ 172.310577][T13215] loop1: detected capacity change from 0 to 264192 [ 172.318881][T13214] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 172.328613][T13214] EXT4-fs (loop3): group descriptors corrupted! 05:57:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x208000, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f0000000140)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket(0x29, 0x5, 0x8) ioctl$sock_ifreq(r2, 0x891b, &(0x7f0000000180)={'wg2\x00', @ifru_ivalue}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:19 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:19 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x22000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 172.452632][T13242] loop4: detected capacity change from 0 to 4096 [ 172.460010][T13250] loop2: detected capacity change from 0 to 264192 [ 172.470222][T13242] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 172.479969][T13242] EXT4-fs (loop4): group descriptors corrupted! [ 172.486555][T13251] loop3: detected capacity change from 0 to 4096 [ 172.539249][T13251] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) [ 172.548569][T13251] EXT4-fs (loop3): group descriptors corrupted! [ 172.557695][T13264] loop1: detected capacity change from 0 to 264192 05:57:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xa000000, 0x0, 0x0, 0x0, 0x0) 05:57:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:20 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x25000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:20 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x7) fallocate(r1, 0x1, 0x8001, 0x1) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000477000/0x3000)=nil, 0x3000, 0x9, 0x50, r0, 0x31ff0000) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}]}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 173.080257][ T25] audit: type=1326 audit(1619675839.971:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13211 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 173.172589][T13286] tmpfs: Bad value for 'mpol' [ 173.177659][T13285] loop4: detected capacity change from 0 to 4096 [ 173.180885][T13290] loop3: detected capacity change from 0 to 4096 [ 173.190953][T13285] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 173.192940][T13288] loop2: detected capacity change from 0 to 264192 [ 173.200661][T13285] EXT4-fs (loop4): group descriptors corrupted! 05:57:20 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x33030000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 173.218326][T13287] loop1: detected capacity change from 0 to 264192 [ 173.218585][ T25] audit: type=1326 audit(1619675840.101:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13282 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 173.257537][T13290] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) [ 173.267000][T13290] EXT4-fs (loop3): group descriptors corrupted! 05:57:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0xfc192000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:20 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='huge=n\x00\x00\x00\x00,\x00']) preadv(r0, &(0x7f0000002600)=[{&(0x7f0000000100)=""/65, 0x41}, {&(0x7f0000000180)=""/1, 0x1}, {&(0x7f00000001c0)=""/106, 0x6a}, {&(0x7f0000000240)=""/247, 0xf7}, {&(0x7f0000000340)=""/95, 0x5f}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/246, 0xf6}, {&(0x7f0000002540)=""/172, 0xac}], 0xa, 0x5312, 0x80000000) 05:57:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 173.368457][T13319] tmpfs: Bad value for 'huge' [ 173.370376][T13322] loop2: detected capacity change from 0 to 264192 [ 173.374283][T13318] loop4: detected capacity change from 0 to 4096 [ 173.387175][T13320] loop1: detected capacity change from 0 to 264192 [ 173.394000][T13319] tmpfs: Bad value for 'huge' [ 173.402340][T13318] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 173.412076][T13318] EXT4-fs (loop4): group descriptors corrupted! [ 173.423303][T13327] loop3: detected capacity change from 0 to 4096 [ 173.447944][T13327] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) [ 173.457296][T13327] EXT4-fs (loop3): group descriptors corrupted! 05:57:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xb000000, 0x0, 0x0, 0x0, 0x0) 05:57:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x50, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:20 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x36140000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:20 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x0) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:21 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3f000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:21 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x0) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 174.104162][T13349] loop3: detected capacity change from 0 to 4096 [ 174.113531][T13349] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 174.113583][T13354] loop2: detected capacity change from 0 to 264192 [ 174.124011][T13349] EXT4-fs (loop3): group descriptors corrupted! [ 174.136966][T13356] loop4: detected capacity change from 0 to 4096 [ 174.144751][T13355] loop1: detected capacity change from 0 to 264192 [ 174.183152][T13356] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) [ 174.192425][T13356] EXT4-fs (loop4): group descriptors corrupted! 05:57:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:21 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x0) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 174.263453][T13377] loop1: detected capacity change from 0 to 264192 [ 174.323096][T13389] loop4: detected capacity change from 0 to 4096 [ 174.323651][T13391] loop3: detected capacity change from 0 to 4096 [ 174.336604][T13389] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) [ 174.342007][T13392] loop1: detected capacity change from 0 to 264192 [ 174.345938][T13389] EXT4-fs (loop4): group descriptors corrupted! [ 174.368180][T13391] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) [ 174.377476][T13391] EXT4-fs (loop3): group descriptors corrupted! 05:57:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0) 05:57:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/time\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)={0x2000}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="687567653d6e657665722c0032bbda78c390e911371bf43904eb44f8f49507e2f9a882859c3ef32148aac1081f4c9d0e51a07c2293579e65cb05d084a93d0e9cbaaa4688adae69062fb5cf703df273a5bda7bd"]) 05:57:21 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x40000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:21 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 174.934072][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 174.934092][ T25] audit: type=1326 audit(1619675841.821:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13348 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 175.022164][T13414] loop1: detected capacity change from 0 to 264192 [ 175.034083][T13413] loop2: detected capacity change from 0 to 264192 [ 175.040909][T13418] loop3: detected capacity change from 0 to 4096 [ 175.047624][T13420] loop4: detected capacity change from 0 to 4096 05:57:22 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x45020000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6875cc3d73f4943b80322c00"]) 05:57:22 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 175.069669][ T25] audit: type=1326 audit(1619675841.961:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13406 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 175.098148][T13418] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) [ 175.107517][T13418] EXT4-fs (loop3): group descriptors corrupted! 05:57:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) r2 = fsmount(r1, 0x1, 0x80) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x5000, 0x20) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x18) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) r3 = mmap$IORING_OFF_SQES(&(0x7f0000735000/0x3000)=nil, 0x3000, 0x200000a, 0x2010, r1, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00002a3000/0x4000)=nil, 0x4000, 0x14, 0x1}, 0xffffff23) 05:57:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 175.153867][T13420] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) [ 175.156029][T13432] tmpfs: Unknown parameter 'huÌ' [ 175.163239][T13420] EXT4-fs (loop4): group descriptors corrupted! 05:57:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 175.220194][T13434] loop2: detected capacity change from 0 to 264192 [ 175.222601][T13443] loop3: detected capacity change from 0 to 4096 [ 175.236460][T13443] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) [ 175.245799][T13443] EXT4-fs (loop3): group descriptors corrupted! [ 175.293597][T13451] loop1: detected capacity change from 0 to 264192 [ 175.334167][T13458] loop3: detected capacity change from 0 to 4096 [ 175.362751][T13458] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 175.372582][T13458] EXT4-fs (loop3): group descriptors corrupted! 05:57:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xd000000, 0x0, 0x0, 0x0, 0x0) 05:57:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = io_uring_setup(0x35cb, &(0x7f00000001c0)={0x0, 0x8fa2, 0x12, 0x0, 0xc7}) fcntl$setpipe(r1, 0x407, 0x800) r2 = socket(0x26, 0x3, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) mmap(&(0x7f00001b6000/0x1000)=nil, 0x1000, 0x0, 0x810, r2, 0x845c7000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="68756765c0382080afff2b0c0800000000"]) 05:57:22 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x48000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:22 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 175.867855][ T25] audit: type=1326 audit(1619675842.751:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13406 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 175.960377][ T25] audit: type=1326 audit(1619675842.851:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13478 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 175.971386][T13483] tmpfs: Unknown parameter 'hugeÀ8 €¯ÿ+ ' [ 175.991700][T13479] loop3: detected capacity change from 0 to 4096 [ 175.996155][T13496] tmpfs: Unknown parameter 'hugeÀ8 €¯ÿ+ ' [ 176.004200][T13485] loop1: detected capacity change from 0 to 264192 [ 176.008278][T13482] loop2: detected capacity change from 0 to 264192 [ 176.019335][T13484] loop4: detected capacity change from 0 to 4096 [ 176.026206][T13479] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 176.036003][T13479] EXT4-fs (loop3): group descriptors corrupted! [ 176.045733][T13484] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! 05:57:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f0000000100)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40140, 0x0) mmap(&(0x7f0000373000/0x1000)=nil, 0x1000, 0x3000009, 0x4010, r1, 0x8fddc000) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) [ 176.056244][T13484] EXT4-fs (loop4): group descriptors corrupted! 05:57:23 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:23 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) [ 176.127341][T13511] loop3: detected capacity change from 0 to 4096 [ 176.136208][T13511] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 176.146107][T13511] EXT4-fs (loop3): group descriptors corrupted! 05:57:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 176.216961][T13527] loop2: detected capacity change from 0 to 264192 [ 176.220532][T13523] loop1: detected capacity change from 0 to 264192 [ 176.230642][T13534] loop4: detected capacity change from 0 to 4096 [ 176.260321][T13534] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) [ 176.271323][T13534] EXT4-fs (loop4): group descriptors corrupted! 05:57:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xe000000, 0x0, 0x0, 0x0, 0x0) 05:57:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x100010, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x10) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='h}ge=never,\x00']) 05:57:23 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x68000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:23 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 176.792223][ T25] audit: type=1326 audit(1619675843.681:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13478 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:23 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 176.878035][T13557] tmpfs: Unknown parameter 'h}ge' [ 176.884536][T13558] loop4: detected capacity change from 0 to 4096 [ 176.894041][T13559] loop2: detected capacity change from 0 to 264192 [ 176.894259][T13558] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) [ 176.909866][T13558] EXT4-fs (loop4): group descriptors corrupted! 05:57:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='hug\t\x00never,\x00']) [ 176.923794][ T25] audit: type=1326 audit(1619675843.811:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13550 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 176.949310][T13564] loop3: detected capacity change from 0 to 4096 [ 176.956585][T13562] loop1: detected capacity change from 0 to 264192 [ 176.963297][T13564] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! 05:57:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:23 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x74000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:23 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 176.973791][T13564] EXT4-fs (loop3): group descriptors corrupted! [ 176.982135][T13575] tmpfs: Unknown parameter 'hug ' [ 177.013354][T13583] loop2: detected capacity change from 0 to 264192 [ 177.063403][T13591] loop4: detected capacity change from 0 to 4096 [ 177.072795][T13591] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 177.082627][T13591] EXT4-fs (loop4): group descriptors corrupted! [ 177.138523][T13604] loop2: detected capacity change from 0 to 264192 [ 177.162837][T13605] loop1: detected capacity change from 0 to 264192 [ 177.720899][ T25] audit: type=1326 audit(1619675844.611:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13550 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0) 05:57:24 executing program 0: r0 = syz_io_uring_setup(0xd1b, &(0x7f0000000840), &(0x7f0000ee4000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000800)=0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}, 0x0) setgroups(0x0, 0x0) io_uring_enter(r0, 0x43ba, 0x0, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000300)=[{&(0x7f0000000340)=""/110, 0x6e}, {&(0x7f0000000240)=""/157, 0x9d}], 0x2, 0x0, 0xfffffffe) r6 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FIGETBSZ(r6, 0x2, &(0x7f0000000180)) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5]) 05:57:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) 05:57:24 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7a000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 177.812502][T13623] loop4: detected capacity change from 0 to 4096 [ 177.819694][T13627] loop2: detected capacity change from 0 to 264192 [ 177.819809][T13624] loop1: detected capacity change from 0 to 264192 [ 177.826539][ T25] audit: type=1326 audit(1619675844.711:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13616 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 177.857598][T13628] loop3: detected capacity change from 0 to 4096 [ 177.870066][T13630] tmpfs: Unknown parameter 'hugm' [ 177.875495][T13628] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 177.885323][T13628] EXT4-fs (loop3): group descriptors corrupted! [ 177.902628][T13623] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 05:57:24 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 177.907287][T13643] tmpfs: Unknown parameter 'hugm' [ 177.912404][T13623] EXT4-fs (loop4): group descriptors corrupted! 05:57:24 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xba010000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:24 executing program 0: io_destroy(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_setup(0x7f, &(0x7f0000000000)=0x0) r2 = epoll_create(0xfffffffd) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) io_setup(0x7f, &(0x7f0000000000)=0x0) r4 = epoll_create(0x6) io_submit(r3, 0x1, &(0x7f0000000040)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r4, 0x0}]) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) io_pgetevents(r3, 0x100000001, 0x1, &(0x7f0000000100)=[{}], &(0x7f0000000180)={r5, r6+10000000}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x8]}, 0x8}) io_destroy(r1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 178.068492][T13655] loop3: detected capacity change from 0 to 4096 [ 178.080041][T13657] loop4: detected capacity change from 0 to 4096 [ 178.089967][T13655] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 178.099059][T13662] loop2: detected capacity change from 0 to 264192 [ 178.099746][T13655] EXT4-fs (loop3): group descriptors corrupted! 05:57:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 178.117721][T13657] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 178.127505][T13657] EXT4-fs (loop4): group descriptors corrupted! [ 178.242593][T13674] loop4: detected capacity change from 0 to 4096 [ 178.257109][T13674] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983065)! [ 178.267645][T13674] EXT4-fs (loop4): group descriptors corrupted! [ 178.647610][ T25] audit: type=1326 audit(1619675845.531:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13616 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x11000000, 0x0, 0x0, 0x0, 0x0) 05:57:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='hugetlb.2MB.limit_in_bytes\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000480), 0x8, 0xe647, 0x3) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10) 05:57:25 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xc0ed0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) [ 178.734599][T13697] loop3: detected capacity change from 0 to 4096 [ 178.748536][T13697] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 178.753104][ T25] audit: type=1326 audit(1619675845.641:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13694 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x8010, r0, 0x729f7000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="68756e657665722c00000010f95b99eb2a761ee723d8340645e341540c5d50975f2f498fa5471c0200b87d9fe3c9167c686af318c2b884c0934c3c639b742ffe478d33845088bf2575cff617f77c037b83a32f2ccd71c60206b43f5f0d6bbe4c7da41c699d67b7156d218b00"/122]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) [ 178.758424][T13697] EXT4-fs (loop3): group descriptors corrupted! [ 178.791293][T13699] loop4: detected capacity change from 0 to 4096 [ 178.798703][T13707] loop2: detected capacity change from 0 to 264192 [ 178.811261][T13703] loop1: detected capacity change from 0 to 264192 05:57:25 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xcb000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 178.863170][T13699] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 178.873212][T13699] EXT4-fs (loop4): group descriptors corrupted! [ 178.889337][T13718] tmpfs: Unknown parameter 'hunever' [ 178.909690][T13715] loop3: detected capacity change from 0 to 4096 [ 178.920439][T13715] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 178.930273][T13715] EXT4-fs (loop3): group descriptors corrupted! [ 178.937512][T13718] tmpfs: Unknown parameter '/proc/self/exe' 05:57:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) fsetxattr(r0, &(0x7f0000000100)=@random={'os2.', '\x00'}, &(0x7f0000000140)=':\x00', 0x2, 0x1) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="687567653d6e657665722c0088e651dff020e73ce621e342d820ff7f9b684f63fb882fda48aff1cc84b44ed78fcc9e224e81387db92587ab8d4bdf717c6875a4eed5cf5992c812235c80c42556ce5725ed6dbe7e6d1c3697edeaf82ed32a3767c85c0a870fe5773b5bc5ecb7d5b1ca38ee1916361d75267a5324819e9d08098601caf236915ddcc5e290ab0e5e3888af79b0e1482e7c2f4edcd5340c6e461389517015103994896f2f"]) 05:57:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 179.016369][T13731] loop2: detected capacity change from 0 to 264192 [ 179.084850][T13739] loop4: detected capacity change from 0 to 4096 [ 179.124520][T13739] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 179.134444][T13739] EXT4-fs (loop4): group descriptors corrupted! [ 179.150669][T13748] loop3: detected capacity change from 0 to 4096 [ 179.187025][T13748] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 179.196880][T13748] EXT4-fs (loop3): group descriptors corrupted! 05:57:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f00001ef000/0x2000)=nil, 0x2000, 0x2000005, 0x8010, r0, 0x7c9a7000) 05:57:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x12000000, 0x0, 0x0, 0x0, 0x0) 05:57:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) 05:57:26 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xde000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:26 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf0ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 179.663936][T13774] loop2: detected capacity change from 0 to 264192 [ 179.689316][T13779] loop1: detected capacity change from 0 to 264192 [ 179.689646][T13775] loop3: detected capacity change from 0 to 4096 [ 179.701280][T13780] loop4: detected capacity change from 0 to 4096 05:57:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) preadv(r1, &(0x7f0000000300)=[{&(0x7f0000000080)=""/23, 0x17}, {&(0x7f00000000c0)=""/10, 0xa}, {&(0x7f0000000200)=""/71, 0x47}, {&(0x7f0000000280)=""/74, 0x4a}], 0x4, 0x8, 0x5df) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r4) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000140)='./file0\x00', 0xee00, r5) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x7010090, &(0x7f0000000340)=ANY=[@ANYBLOB='Gid=', @ANYRESHEX=r4, @ANYBLOB="2c29ffed9e6c6f636b733d392d6d322c6e725f696e6f6465733d252c6e725f626c6f636b733d25672c7569643d3405cb2180a4e5a5e354f07fff6845c75c5ea1d983dc39462161c3e413db49e8d2c68443002c734b510cabd311de83b56e3729d0e94308294165ca47423c79572e348f7ec08b53973316010600c01b813ed0d3c2eeecc916460a21a0080001000000000000007ea9286ba6adc707441b6fa4c49cb2f15c961590a5fe8ef4ce50b1a48d6ae068468397919ed10b621f00a0aa0211b4", @ANYRESHEX=r3, @ANYBLOB=',huge=always,nr_blocks=pt1]7308,nr_inodes==87,\x00']) 05:57:26 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 179.734278][T13775] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 179.744094][T13775] EXT4-fs (loop3): group descriptors corrupted! [ 179.751918][T13780] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 179.761385][T13796] loop2: detected capacity change from 0 to 264192 [ 179.761711][T13780] EXT4-fs (loop4): group descriptors corrupted! [ 179.844921][T13804] tmpfs: Unknown parameter 'Gid' [ 179.858176][T13803] loop2: detected capacity change from 0 to 264192 05:57:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 05:57:26 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf9fdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 179.983264][T13816] loop3: detected capacity change from 0 to 4096 [ 179.995013][T13817] loop4: detected capacity change from 0 to 4096 [ 180.026897][T13817] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 180.037059][T13817] EXT4-fs (loop4): group descriptors corrupted! [ 180.045160][T13816] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 180.055016][T13816] EXT4-fs (loop3): group descriptors corrupted! [ 180.075430][T13827] loop2: detected capacity change from 0 to 264192 05:57:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x25000000, 0x0, 0x0, 0x0, 0x0) 05:57:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:27 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfc070000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0x2, 0x1, 0x6}) dup2(r1, r0) 05:57:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:27 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(0x0, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 180.518014][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 180.518039][ T25] audit: type=1326 audit(1619675847.401:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13773 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 180.613413][T13846] loop3: detected capacity change from 0 to 4096 [ 180.628731][ T25] audit: type=1326 audit(1619675847.511:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13849 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 180.653052][T13852] loop4: detected capacity change from 0 to 4096 05:57:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000701000/0x2000)=nil, 0x2000, 0x1000006, 0x20010, r0, 0xc9f2b000) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:27 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfdfdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 180.670610][T13854] loop2: detected capacity change from 0 to 264192 [ 180.681624][T13846] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 180.691497][T13846] EXT4-fs (loop3): group descriptors corrupted! [ 180.704061][T13852] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 180.713825][T13852] EXT4-fs (loop4): group descriptors corrupted! 05:57:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x16200180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f0000000900), 0x9, 0x20c3) fallocate(r1, 0x6, 0x400, 0x5) r2 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000002bc0), 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x36) wait4(r2, &(0x7f00000000c0), 0x8, &(0x7f0000000a40)) r3 = fcntl$getown(r1, 0x9) ptrace$cont(0x9, r3, 0x0, 0xb11) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x4, 0x5) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="6834efbc38e9e5675c2aa666f3478e098b23b11ec5cc817382020b0ae48e3be40000"]) r4 = accept4$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0x10, 0x80800) preadv(r4, &(0x7f0000000800)=[{&(0x7f0000000180)=""/69, 0x45}, {&(0x7f0000000200)=""/146, 0x92}, {&(0x7f00000002c0)=""/239, 0xef}, {&(0x7f00000003c0)=""/167, 0xa7}, {&(0x7f0000000480)=""/173, 0xad}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000005c0)=""/198, 0xc6}, {&(0x7f00000006c0)=""/238, 0xee}, {&(0x7f0000000a00)=""/12, 0xc}], 0x9, 0x3, 0xffffffff) [ 180.786277][T13872] loop3: detected capacity change from 0 to 4096 [ 180.801650][T13867] loop2: detected capacity change from 0 to 264192 [ 180.814642][T13872] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 180.824478][T13872] EXT4-fs (loop3): group descriptors corrupted! 05:57:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 180.894402][T13887] loop3: detected capacity change from 0 to 4096 [ 180.912300][T13890] loop4: detected capacity change from 0 to 4096 [ 180.913142][T13893] loop1: detected capacity change from 0 to 264192 [ 180.929090][T13890] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 180.938919][T13890] EXT4-fs (loop4): group descriptors corrupted! [ 180.945998][T13887] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 180.955684][T13887] EXT4-fs (loop3): group descriptors corrupted! 05:57:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0) 05:57:28 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfeffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800003, 0x12, r0, 0x63b14000) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) fsetxattr$security_ima(r1, &(0x7f0000000040), &(0x7f0000000080)=@md5={0x1, "f7f32f7fe21001bce2cbb4dc228c6581"}, 0x11, 0x1) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 05:57:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:28 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(0x0, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 181.450899][ T25] audit: type=1326 audit(1619675848.341:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13849 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='huge=.ever,\x00']) [ 181.546307][T13915] loop2: detected capacity change from 0 to 264192 [ 181.553505][ T25] audit: type=1326 audit(1619675848.441:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13906 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 181.578411][T13919] loop3: detected capacity change from 0 to 4096 [ 181.585916][T13920] loop4: detected capacity change from 0 to 4096 05:57:28 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xff0f0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 181.598921][T13921] loop1: detected capacity change from 0 to 264192 [ 181.623498][T13929] tmpfs: Bad value for 'huge' [ 181.630436][T13920] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 181.640261][T13920] EXT4-fs (loop4): group descriptors corrupted! 05:57:28 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfff7ffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) [ 181.648543][T13919] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 181.658256][T13919] EXT4-fs (loop3): group descriptors corrupted! 05:57:28 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(0x0, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 181.754984][T13942] loop2: detected capacity change from 0 to 264192 [ 181.770305][T13952] loop3: detected capacity change from 0 to 4096 [ 181.792532][T13952] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 181.799801][T13954] loop1: detected capacity change from 0 to 264192 [ 181.802272][T13952] EXT4-fs (loop3): group descriptors corrupted! [ 182.384021][ T25] audit: type=1326 audit(1619675849.271:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13906 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x45020000, 0x0, 0x0, 0x0, 0x0) 05:57:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x40000, 0x0) fchdir(r1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r3, &(0x7f0000002ac0)=[{&(0x7f00000006c0)=""/190, 0xbe}, {&(0x7f0000000780)=""/95, 0x5f}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/43, 0x2b}, {&(0x7f0000001840)=""/5, 0x5}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000002880)=""/252, 0xfc}, {&(0x7f0000002980)=""/216, 0xd8}, {&(0x7f0000002a80)=""/1, 0x1}], 0x9, 0x6, 0x9) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000280)={{r2}, 0x2, 0x8001, 0x1}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) r4 = pidfd_getfd(r0, r0, 0x0) sendmsg$NFT_MSG_GETTABLE(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x18e0a000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, 0x1, 0xa, 0x5, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0xc094) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f00000002c0)={0x0, 0x6, 0x16}) 05:57:29 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:29 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffbffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 182.459820][T13975] loop4: detected capacity change from 0 to 4096 [ 182.466515][T13974] loop2: detected capacity change from 0 to 264192 [ 182.475812][T13981] loop3: detected capacity change from 0 to 4096 [ 182.483120][ T25] audit: type=1326 audit(1619675849.381:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13977 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 182.508724][T13979] loop1: detected capacity change from 0 to 264192 [ 182.526292][T13981] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) [ 182.535662][T13981] EXT4-fs (loop3): group descriptors corrupted! 05:57:29 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffff1f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r1, 0x4018f50b, &(0x7f0000000100)={0x1, 0x7, 0x2}) r2 = socket$nl_audit(0x10, 0x3, 0x9) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1800003, 0x12, r2, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380), 0x40, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(0x0, 0x4, &(0x7f0000000500)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0xdcb, 0xffffffffffffffff, &(0x7f0000000140)="1fe41bc3c667a70c6f9d98057be96acc7a695d0612e0120d4423fa9706b7530742bb77c7f00fc138f72b872aca7f468699dd7b88fa040cc52960704630eb910216e1910e26f9da0f8cb8e4e8d18ede5ec9bec0e7a8c5b5c777ba5bacc2b543209d6a2ed987894aa2abd36c16067bc27eac6f7b0bffddc2c2c1ab473307aa", 0x7e, 0x7, 0x0, 0x3, r3}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x7f, r4, &(0x7f0000000240)="3e54d98a0ce8c8195035e720eac9bcb03518d480125990368a71fb407900fc7f053ecd35af47280b07c7d226af5d56a3977fbf58570b630a6c8b96f23f4902912a49aa48d9e074143c4c9332d011af0f92f833ca3403d225fae8eb1f", 0x5c, 0x7, 0x0, 0x2, r0}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0xdb8, r5, &(0x7f0000000300)="34360ef1bde211942563395730944865127d74c259e62aa93c7edf8cf34033e768e9513d778bd1212ef98de7ab6a380357cff844d7bd207593c9f13a7a8cb3892303e92e28c206c9e84ae28b30164df901a8c7ab7f85e7891693ad792b09245f2cb256596934ceebbf3ec0f12bf5c6c9b87b91b4445511c03a416d24addc", 0x7e, 0x200, 0x0, 0x2, r6}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x5, 0x3, r1, &(0x7f0000000400)="70ba03f6e055a640687193afc68bf5698c38b2c4f3b944fe133d3148ad425e9f3fae961e537ad04e6a80214836ca8bd9bcfdb5aea74e49f5ffb7c0fd3ac1f7d1d9a1b53cc3c9c72efd1d825ee5616e09f285c406021bcf454f906929bb402b8ce7107f8b0fd2d0199206448de9efe782f95a35e85ccee23825b1845904442148403697fa4b3a35569a059ddbad0c00cd78792c45b92619fe9c1a", 0x9a, 0x6, 0x0, 0x2, r7}]) [ 182.557211][T13975] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 182.567045][T13975] EXT4-fs (loop4): group descriptors corrupted! 05:57:29 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 182.637458][T14001] tmpfs: Unknown parameter 'h—¯P¶ò’›Ù÷ugX' [ 182.670906][T14007] loop3: detected capacity change from 0 to 4096 05:57:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000100)=@known='trusted.overlay.upper\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) [ 182.689874][T14001] tmpfs: Unknown parameter 'h—¯P¶ò’›Ù÷ugX' [ 182.702361][T14015] loop2: detected capacity change from 0 to 264192 [ 182.716487][T14007] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) [ 182.725779][T14007] EXT4-fs (loop3): group descriptors corrupted! [ 182.734992][T14010] loop1: detected capacity change from 0 to 264192 [ 182.769282][T14021] loop4: detected capacity change from 0 to 4096 [ 182.781074][T14021] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 182.790920][T14021] EXT4-fs (loop4): group descriptors corrupted! 05:57:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x48000000, 0x0, 0x0, 0x0, 0x0) 05:57:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="687567610f78bb766572113b"]) 05:57:30 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:30 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffe000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 183.302073][ T25] audit: type=1326 audit(1619675850.191:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13977 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 183.390039][T14051] loop3: detected capacity change from 0 to 4096 [ 183.399043][T14051] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) [ 183.408364][T14051] EXT4-fs (loop3): group descriptors corrupted! [ 183.415526][ T25] audit: type=1326 audit(1619675850.311:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14044 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 183.439402][T14056] loop4: detected capacity change from 0 to 4096 [ 183.447437][T14056] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 183.448913][T14055] loop2: detected capacity change from 0 to 264192 [ 183.457183][T14056] EXT4-fs (loop4): group descriptors corrupted! [ 183.465502][T14059] tmpfs: Unknown parameter 'hugax»ver;' [ 183.476341][T14054] loop1: detected capacity change from 0 to 264192 05:57:30 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffff7ff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="d3687567653d6e657665722c76af61ee4eb91b93bf7b53d59e1c4c9d2133f983220e6010d98a92d5627780bb76444126a81ef4f8a1c1bebcc9cbaf5e5675e21bfe14cf2bac5454d4ee486624baaf766ce5093b46224b588257b76f76f8a59aa68ed407adb6c5a40df936d12a76a642488882cd804fb91d5e9bb1818d20642c5f36ceb3e2e12eed16315212daa44cfb20ab16c1b555e0bc82362282f982a1b81dfb2ec84aac70"]) 05:57:30 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) [ 183.551993][T14069] loop3: detected capacity change from 0 to 4096 [ 183.558250][T14077] tmpfs: Unknown parameter 'Óhuge' [ 183.590342][T14069] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 05:57:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 183.600166][T14069] EXT4-fs (loop3): group descriptors corrupted! [ 183.612663][T14085] loop1: detected capacity change from 0 to 264192 05:57:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0xf70, &(0x7f0000000100)={0x0, 0x3024, 0x0, 0x0, 0x3e6, 0x0, r0}, &(0x7f00001e9000/0x6000)=nil, &(0x7f00001e8000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x7463, &(0x7f0000000180), &(0x7f00003b2000/0x800000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000340)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x4, 0x0, 0x3ff}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000140)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0xfffffffc) r4 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)={0x0, 0x989680}, 0x1, 0x0, 0x0, {0x0, r7}}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd=r0, 0x0, 0x0, 0x9, 0xa, 0x0, {0x0, r7, r0}}, 0x8) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) [ 183.651822][T14091] loop2: detected capacity change from 0 to 264192 [ 183.656593][T14092] loop4: detected capacity change from 0 to 4096 [ 183.693892][T14092] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 183.703660][T14092] EXT4-fs (loop4): group descriptors corrupted! 05:57:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x4c000000, 0x0, 0x0, 0x0, 0x0) 05:57:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:31 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) [ 184.218329][ T25] audit: type=1326 audit(1619675851.101:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14044 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="687567653d6e657665722c008abf607b8d5137555103afbc150bccabe4242387871a14e6114c4f79d9db618908f1a6bfa48826472af35f0d6896a70540f88c247c3e590b6f620c307f99ff3ab8a7a36cc93b06e49e07f1528cc63e9e622dc706a689d0c81f1671847d925b41f46da607fe255b5c375d825a0c3900a18ad2b7ddf6bbc831a4ffc382b2b983301f47d612606fbcc1745bddb619f7640bce551e318140f9d91dd529abe0d0bf2c49126c9099041541080e64165859a52c6930c59893c48b744030ea14328027b0bbbb36beb3"]) 05:57:31 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffbff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004000000", 0xc, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 184.308481][T14127] loop1: detected capacity change from 0 to 264192 [ 184.313297][T14124] loop4: detected capacity change from 0 to 4096 [ 184.315237][T14126] loop2: detected capacity change from 0 to 264192 [ 184.331229][T14124] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 184.340993][T14124] EXT4-fs (loop4): group descriptors corrupted! 05:57:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="653dc89768a00000000000000000"]) creat(&(0x7f00000001c0)='./file0\x00', 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RREADLINK(r2, &(0x7f00000000c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000100)=""/40) 05:57:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 184.362408][T14133] loop3: detected capacity change from 0 to 4096 [ 184.370757][ T25] audit: type=1326 audit(1619675851.261:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14123 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:31 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffdf9, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x68000000, 0x0, 0x0, 0x0, 0x0) 05:57:31 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) [ 184.421900][T14133] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 184.431722][T14133] EXT4-fs (loop3): group descriptors corrupted! [ 184.468698][T14146] tmpfs: Unknown parameter 'e' 05:57:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:31 executing program 0: ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000140)=0xfffffffffffffffe) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchmodat(r1, &(0x7f00000001c0)='./file0\x00', 0x1e) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) [ 184.496091][T14146] tmpfs: Unknown parameter 'e' [ 184.508756][T14153] loop4: detected capacity change from 0 to 4096 [ 184.533777][T14153] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) 05:57:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/47, 0x2f) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:31 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffdfd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 184.543199][T14153] EXT4-fs (loop4): group descriptors corrupted! [ 184.552752][T14162] loop2: detected capacity change from 0 to 264192 [ 184.560170][T14163] loop1: detected capacity change from 0 to 264192 05:57:31 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB]) [ 184.627355][T14176] loop3: detected capacity change from 0 to 4096 [ 184.653836][T14176] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 184.663673][T14176] EXT4-fs (loop3): group descriptors corrupted! [ 184.668599][T14179] loop2: detected capacity change from 0 to 264192 [ 184.697738][T14189] loop4: detected capacity change from 0 to 4096 [ 184.717674][T14189] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) [ 184.727034][T14189] EXT4-fs (loop4): group descriptors corrupted! 05:57:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000001900", 0xe, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) r1 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000100), 0x2, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r1, 0xf507, 0x0) [ 184.746690][T14195] loop1: detected capacity change from 0 to 264192 05:57:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 184.788875][T14205] loop4: detected capacity change from 0 to 4096 [ 184.804858][T14205] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (15333!=0) [ 184.814452][T14205] EXT4-fs (loop4): group descriptors corrupted! [ 184.828355][T14209] loop3: detected capacity change from 0 to 4096 [ 184.858703][T14209] EXT4-fs (loop3): unsupported descriptor size 0 05:57:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x6c000000, 0x0, 0x0, 0x0, 0x0) 05:57:32 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:32 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="687567653d6e657665722c00ca7758a857c164544c35f81bbe889e92a13daa2bb005a99fba8604a76d2707f4bbbbe164499718087af5fe4d46d5e2da960975e2aae378af0c44c482d556ad1ff339f7602412bb17980297eca88358f756275d83d99451aae90211de753d14653da01f124bee4fea324b8845bc556f4cbc01c1fd3d9488b058fdabc8e66f67f2d1"]) 05:57:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 185.430364][T14234] loop3: detected capacity change from 0 to 4096 [ 185.431213][T14238] loop1: detected capacity change from 0 to 264192 [ 185.437902][T14239] loop2: detected capacity change from 0 to 264192 [ 185.451608][T14236] loop4: detected capacity change from 0 to 4096 [ 185.461915][T14234] EXT4-fs (loop3): unsupported descriptor size 0 05:57:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) flistxattr(r0, &(0x7f00000001c0)=""/101, 0x65) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="15621fc5bce2dbbd0d9440799e494072d69004c000000000df21181cbb"]) 05:57:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:32 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 185.473652][T14236] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 185.483579][T14236] EXT4-fs (loop4): group descriptors corrupted! 05:57:32 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendto(r1, 0x0, 0x0, 0x0, &(0x7f00000006c0)=@l2={0x1f, 0x0, @fixed}, 0x80) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000280)={@mcast1, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, r5}) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000480)={@dev={0xfe, 0x80, '\x00', 0x44}, @private2, @empty, 0x10000, 0x6, 0x2cc7, 0x400, 0x1, 0x80100102, r5}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000740)={0x388, 0x0, 0x20, 0x70bd2b, 0x0, {}, [{{0x8}, {0x178, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xee}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4d1}}, {0x8}}}]}}, {{0x8}, {0x1ec, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r5}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xce0}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x0, 0xff, 0x60, 0x510}, {0x1, 0x2, 0x6, 0x1}, {0x4, 0xff, 0x0, 0x4}, {0x2, 0x7f, 0x5, 0x7}, {0x6, 0xa8, 0x9, 0xfffff000}, {0xff27, 0x7f, 0x81, 0xffff7fff}, {0x0, 0x20, 0x0, 0x2}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}]}}]}, 0x388}, 0x1, 0x0, 0x0, 0x80}, 0x4010) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="00dc0000", @ANYRES16=r2, @ANYBLOB="080026bd7000fedbdf250100000008000600", @ANYRES32=r5, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x240000c1}, 0x4000040) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x501001, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r6, &(0x7f0000000440)={&(0x7f0000000300), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="b8000000", @ANYRES16=0x0, @ANYBLOB="010029bd7000fcdbdf2510000000080006000700000008", @ANYRES32=r5, @ANYBLOB="0800030000000000080006000600000008000900000100000800ff00020000005800018008000300010000001400020073797a5f74756e03008f7f000000000008000300010000f70a000000", @ANYRES32=r5, @ANYBLOB="1400020069703665727370616e300000000000001400020065727370616e300000000000000000000800090008000000"], 0xb8}, 0x1, 0x0, 0x0, 0x2000}, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'erspan0\x00', &(0x7f0000000100)={'gre0\x00', r5, 0x700, 0x7800, 0x4, 0x101, {{0xb, 0x4, 0x3, 0x1, 0x2c, 0x65, 0x0, 0x33, 0x0, 0x0, @multicast2, @loopback, {[@generic={0x83, 0x4, "f8a7"}, @ssrr={0x89, 0x13, 0x68, [@remote, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast]}]}}}}}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='huge=nevea,\x00']) 05:57:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 185.565347][T14257] tmpfs: Unknown parameter 'bżâÛ½”@yžI@rÖÀ' [ 185.586641][T14258] loop3: detected capacity change from 0 to 4096 [ 185.598673][T14259] loop2: detected capacity change from 0 to 264192 [ 185.663250][T14275] loop4: detected capacity change from 0 to 4096 [ 185.678471][T14269] loop1: detected capacity change from 0 to 264192 [ 185.685319][T14258] EXT4-fs (loop3): unsupported descriptor size 0 [ 185.695245][T14272] tmpfs: Bad value for 'huge' [ 185.707205][T14275] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 185.717076][T14275] EXT4-fs (loop4): group descriptors corrupted! [ 185.765638][T14285] tmpfs: Bad value for 'huge' 05:57:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x74000000, 0x0, 0x0, 0x0, 0x0) 05:57:33 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffff0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:33 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(0x0, 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800007, 0x100010, r0, 0x0) faccessat(r0, &(0x7f0000000440)='./file0\x00', 0x17) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000400), 0x40, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000480)=""/120) fstat(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$vcsu(&(0x7f0000000140), 0x4, 0x327800) fsetxattr$security_capability(r4, &(0x7f0000000200), &(0x7f0000000240)=@v1={0x1000000, [{0xa1f1, 0x400}]}, 0xc, 0x1) setfsuid(r3) setresuid(0x0, r3, 0x0) lsetxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000180)=@v3={0x3000000, [{0x6, 0x3}, {0x80008}], r3}, 0x18, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) [ 186.258482][ T25] kauditd_printk_skb: 3 callbacks suppressed [ 186.258495][ T25] audit: type=1326 audit(1619675853.141:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14226 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 186.350835][T14309] loop3: detected capacity change from 0 to 4096 [ 186.357706][T14308] loop2: detected capacity change from 0 to 264192 [ 186.365390][T14312] loop1: detected capacity change from 0 to 264192 [ 186.372580][T14315] loop4: detected capacity change from 0 to 4096 05:57:33 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000100)={0x7, 0x1b, 0x2}, 0x7) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x200000, &(0x7f0000000080)={[{@mode={'mode', 0x3d, 0x2}}]}) [ 186.387063][ T25] audit: type=1326 audit(1619675853.271:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14307 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 186.414449][T14309] EXT4-fs (loop3): unsupported descriptor size 0 [ 186.424075][T14315] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 186.433883][T14315] EXT4-fs (loop4): group descriptors corrupted! 05:57:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:33 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 186.572091][T14342] loop4: detected capacity change from 0 to 4096 [ 186.591770][T14344] loop3: detected capacity change from 0 to 4096 [ 186.601351][T14344] EXT4-fs (loop3): unsupported descriptor size 0 [ 186.607966][T14347] loop2: detected capacity change from 0 to 264192 05:57:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 186.617543][T14342] EXT4-fs (loop4): unsupported descriptor size 0 [ 186.696603][T14356] loop3: detected capacity change from 0 to 4096 [ 186.714492][T14356] EXT4-fs (loop3): unsupported descriptor size 0 05:57:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x7a000000, 0x0, 0x0, 0x0, 0x0) 05:57:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x688202, 0x209) r2 = syz_open_pts(r1, 0x8a080) preadv(r2, &(0x7f00000014c0)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000000100)=""/59, 0x3b}, {&(0x7f0000001180)}, {&(0x7f00000011c0)=""/32, 0x20}, {&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/17, 0x11}, {&(0x7f0000001300)=""/214, 0xd6}, {&(0x7f0000001540)=""/192, 0xc0}], 0x8, 0x7, 0x6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) mmap(&(0x7f000063d000/0x9000)=nil, 0x9000, 0x2000002, 0x8010, r1, 0xea773000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="5f1eedcae19c8572d38328ffcaf47f23c6c28276ef728edf215f242798d3fa657464760d4724ee77d88db2ce427edd3907d72ecf795b9e0252a1dc90d7fa98ee4c9321892ccc1846d740047decd3ba895a7de4098da798a7c82a0a3783c644f5be655807104942dcaea15d4bad131deee60f9e48aaeb9920650251de704fc2534c966b670298054788f71c6d668cc448"]) 05:57:34 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xedc000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:34 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(0x0, 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 187.191718][ T25] audit: type=1326 audit(1619675854.081:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14307 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 187.280349][T14377] loop2: detected capacity change from 0 to 264192 [ 187.284820][T14378] loop4: detected capacity change from 0 to 4096 [ 187.294214][T14382] loop3: detected capacity change from 0 to 4096 [ 187.303227][ T25] audit: type=1326 audit(1619675854.191:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14376 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 187.303519][T14385] tmpfs: Unknown parameter '_íÊᜅrÓƒ(ÿÊô#Æ‚vïrŽß!_$'˜ÓúetdvG$îwزÎB~Ý9×.Ïy[žR¡Ü×ú˜îL“!‰' [ 187.340237][T14386] loop1: detected capacity change from 0 to 264192 [ 187.347931][T14378] EXT4-fs (loop4): unsupported descriptor size 0 05:57:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:34 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 187.375105][T14382] EXT4-fs (loop3): unsupported descriptor size 0 05:57:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 187.428926][T14397] loop4: detected capacity change from 0 to 4096 [ 187.450620][T14397] EXT4-fs (loop4): unsupported descriptor size 0 [ 187.457208][T14402] loop3: detected capacity change from 0 to 4096 [ 187.466710][T14402] EXT4-fs (loop3): unsupported descriptor size 0 05:57:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000001140)=[{&(0x7f0000001180)=""/4083, 0xff3}], 0x1, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:34 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 187.494582][T14412] loop2: detected capacity change from 0 to 264192 [ 187.548098][T14416] loop3: detected capacity change from 0 to 4096 [ 187.581337][T14416] EXT4-fs (loop3): unsupported descriptor size 0 [ 187.602684][T14428] loop2: detected capacity change from 0 to 264192 05:57:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x7fc00000, 0x0, 0x0, 0x0, 0x0) 05:57:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xf, 0x4010, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:35 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7ffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:35 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(0x0, 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 188.116424][ T25] audit: type=1326 audit(1619675855.001:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14376 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 188.208156][ T25] audit: type=1326 audit(1619675855.091:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14444 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 188.231739][T14452] loop4: detected capacity change from 0 to 4096 [ 188.236779][T14454] loop2: detected capacity change from 0 to 264192 [ 188.238302][T14451] loop1: detected capacity change from 0 to 264192 [ 188.245264][T14458] loop3: detected capacity change from 0 to 4096 05:57:35 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x3, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000180)="4bafed9d2a0a4fefe7993ad7c17086e402a8e2085dd6aea7a7a1413ecf9ef06985764479450369bcdd9a5d44feee10d2110d2286ac5621b8b8d2b051374a78193914a9404dee0ca90479d44ebf9ece7b6495d156fe35164393404e84b26703d04aa889c75f62cc627c8bc1e488be37128a59e7a36eebc02c1bf4946ed75f5795c5df76cddb3ec54213e5f4bef0b654ded6b38e6e0295daeeb455668dff9199f4650629f550bf9f50c1646b59db6128f1ee61fcc00623d14b720800f80bedf6cb9eb8dca04c", 0xc5, 0xfffffffffffffeff}, {&(0x7f0000000280)="b2ffee91c353d18f00ad25bed3cc29e516a47caa7dff64cbc263acded62e4cefd4c60c2754f9156c40cd451240", 0x2d, 0x10000}], 0x1, &(0x7f0000000300)={[{@huge_within_size}, {@huge_always}, {@nr_blocks={'nr_blocks', 0x3d, [0x6d]}}, {@size={'size', 0x3d, [0x70]}}, {@size={'size', 0x3d, [0x32, 0x34]}}, {@mpol={'mpol', 0x3d, {'default', '=static', @void}}}, {@mpol={'mpol', 0x3d, {'default', '', @void}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x65, 0x30, 0x35, 0x2d, 0x6d, 0x70]}}, {@gid={'gid', 0x3d, 0xee01}}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@measure}, {@seclabel}]}) [ 188.269708][T14458] EXT4-fs (loop3): unsupported descriptor size 0 [ 188.270611][T14452] EXT4-fs (loop4): unsupported descriptor size 0 05:57:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat2(r0, &(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140)={0x200000, 0x96, 0x9}, 0x18) splice(r1, &(0x7f00000001c0)=0x1, r1, &(0x7f0000000200)=0x7f, 0x2, 0x8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0xa0002006}) ioctl$BTRFS_IOC_SPACE_INFO(r0, 0xc0109414, &(0x7f0000000240)={0xc38, 0x80000000, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x2080001, &(0x7f0000000040)=ANY=[@ANYBLOB="6ebf5f696e6f07733d35212c00b73897fcd419134025353500"]) [ 188.396423][T14474] loop2: detected capacity change from 0 to 264192 05:57:35 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xc000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 188.443637][T14485] loop3: detected capacity change from 0 to 4096 [ 188.459587][T14485] EXT4-fs (loop3): unsupported descriptor size 0 [ 188.468975][T14487] loop4: detected capacity change from 0 to 4096 [ 188.526364][T14487] EXT4-fs (loop4): unsupported descriptor size 0 [ 188.555643][T14498] loop2: detected capacity change from 0 to 264192 [ 189.042187][ T25] audit: type=1326 audit(1619675855.931:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14444 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x7ff00000, 0x0, 0x0, 0x0, 0x0) 05:57:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="687567653d6e657665728f757567a24ee059242c00"]) 05:57:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:35 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x40000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:35 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8400fffffffa) [ 189.137631][ T25] audit: type=1326 audit(1619675856.021:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14512 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 189.149623][T14524] tmpfs: Bad value for 'huge' [ 189.167064][T14521] loop3: detected capacity change from 0 to 4096 [ 189.168892][T14522] loop4: detected capacity change from 0 to 4096 05:57:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="688467010063000000000000175806b01fd73fa3d4c678f09b0f01a245810228df79db4a5f30e02ed73fe72c7bb49ab6961919005369d36b87e4ecba103ffcfea7c0a0372556e79821d3b5dc"]) 05:57:36 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xe0ffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 189.183006][T14521] EXT4-fs (loop3): unsupported descriptor size 0 [ 189.203064][T14523] loop2: detected capacity change from 0 to 264192 [ 189.220635][T14522] EXT4-fs (loop4): unsupported descriptor size 0 05:57:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 189.277382][T14541] tmpfs: Unknown parameter 'h„g' 05:57:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000200)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @b}) flistxattr(r1, &(0x7f0000000140)=""/168, 0xa8) 05:57:36 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 189.309495][T14543] loop3: detected capacity change from 0 to 4096 [ 189.318514][T14551] loop1: detected capacity change from 0 to 264192 [ 189.330110][T14550] loop4: detected capacity change from 0 to 4096 [ 189.339528][T14543] EXT4-fs (loop3): unsupported descriptor size 0 [ 189.353154][T14545] loop2: detected capacity change from 0 to 264192 [ 189.396268][T14550] EXT4-fs (loop4): unsupported descriptor size 0 [ 189.451205][T14567] loop2: detected capacity change from 0 to 264192 05:57:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x7ffc0000, 0x0, 0x0, 0x0, 0x0) 05:57:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f00000000c0), 0x2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000100)={0x0, @aes128, 0x0, @desc3}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="687567653d6e657665722c009c3fc0fe43aa7bcc00daec37b7a9eb8ccea85b8ee1477a150dd20c69cb50348fedb2bbb4c2f05826a00710228f37e6220c24bc67bfe572175b664408d9cc1b64e8e3a3b5a3db45869ddf4f9d86cb5a6c8eaacb7c9b2eff7537e0ea096ef914ce49df7ebc836584d9d03493e39e9134a6fce8b141950302a0fcb48262cf612ddc7da1636f70019df2295200f34a199d06c4200c4f5d8133586055f1a30e0053263b9ec80f2f417306419d287a58b801040bbd7f26753528bfe39f204e20c9d8f9fd1507fc5b"]) 05:57:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:36 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 189.968687][ T25] audit: type=1326 audit(1619675856.851:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14512 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:36 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8400fffffffa) [ 190.034909][T14584] loop3: detected capacity change from 0 to 4096 [ 190.051883][T14584] EXT4-fs (loop3): unsupported descriptor size 0 05:57:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="68756432a200000000000000"]) [ 190.071272][ T25] audit: type=1326 audit(1619675856.961:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14589 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 190.077296][T14595] loop1: detected capacity change from 0 to 264192 05:57:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 190.127855][T14600] loop4: detected capacity change from 0 to 4096 [ 190.156338][T14600] EXT4-fs (loop4): unsupported descriptor size 0 [ 190.160678][T14598] loop2: detected capacity change from 0 to 264192 05:57:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:37 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x204000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 190.182496][T14609] tmpfs: Unknown parameter 'hud2¢' [ 190.188508][T14610] loop3: detected capacity change from 0 to 4096 [ 190.210461][T14610] EXT4-fs (loop3): unsupported descriptor size 0 05:57:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r2, &(0x7f0000001840)={&(0x7f00000012c0)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f00000016c0)=[{&(0x7f0000001300)="9c4ec756a62b2b20c206bff663b94a24de698bf0a4c72d4699f768536a6d86458b9e12d4ebc4982dcbebcf46887807b0f1615ec5ec6aa78ce280d7d09a6ca3bb4d22e2af92a0cb3b7fa4445dc55d5fa599dda316d2243d79ff3c720a8e864f63510f19b52b21824370f0d674d066620cd6b48bf4a266bd1f19228ea0ad89f950ab8acf0629c24ec24ca2cbc8e22b9514e1e3faaa59c6e2123f34626e83c68d", 0x9f}, {&(0x7f00000013c0)="18e0cce1f29382fb0287bf965111e08424aeb0178fdc75b06a6aac72a1eadc1560afe909009c4a206d376a", 0x2b}, {&(0x7f0000001400)="4b0ed1b1586bd4d8fad773aab9f1be87cf884dbfaf1e5506169a06d9ac2705546cac953faed0d5a04429834fb1d785c29df12d1d", 0x34}, {&(0x7f0000001440)="bb42c2e01847a5a92e0638314bea09fe033408e0fc9685134e8eef4a63a44a1968ce2e95ed71657c8d2391a61611b2abc4f61ed9aba8acd0fe7487d9886b8af9ecea1458f8006100b5532dadcb0f6574a3addf62fb2d63e413c351832a88e987e05e8d6bf57ae060601b40279fae7ccbb1bd05bc5f8ab775aaa2f540ad71d3d4701c844e43eb423b12f6a76c43e085ed", 0x90}, {&(0x7f0000001500)="be629a3a407ced7552bb7a51dda312e082b28966b8fb1430b90162f290bedcda9db3c7c5a61fcb95967d6f7a6d502c020839edc26d2c7c38389f54ec1455b83f719b4deb2f3f6966e36b5d205c9d29c7c0f080b2677df359e2f0854ce3f4aeb7612f1682e54eb7966f633323207054d7128a555512bc402b7b4a91d1e168a3cd2bc8bac4aa9b3308f8a751f50c6e06b9fdeb07e370c4", 0x96}, {&(0x7f00000015c0)="e28445bef53484f111ec1729b030bc607e", 0x11}, {&(0x7f0000001600)="96900a6eb29bfa74b046af95759e194240e95e24af292a009c041b8453f63a8637aa6cd5c6b57887c27c4e4227f1b53021d7c7e0d6620125ecff2e15136446aa979c8d4b44d89267670c01bb2c18195fb7f0f454e9b08efd8834d856ffe4acc16c6754f483bff9dfda59908c24dfb7cadce084eb1139d8ca090a2ee5e522e43500aeb34f6e1929d27cd4578a39e32c998672bba3b5c3e61218b64c3e6262a2ae60f7830854c6e2ff102364103d323f329cd18c3644", 0xb5}], 0x7, &(0x7f0000001740)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7f}}, @ip_retopts={{0x84, 0x0, 0x7, {[@cipso={0x86, 0x18, 0x2, [{0x0, 0x6, "05b95113"}, {0x1, 0x2}, {0x7, 0xa, "c001da4cd58f3b5d"}]}, @generic={0x89, 0x9, "0e4f79cef9c014"}, @noop, @noop, @timestamp={0x44, 0x18, 0xea, 0x0, 0x0, [0x2d, 0xfff, 0xb33, 0x0, 0x0]}, @timestamp_prespec={0x44, 0x14, 0x45, 0x3, 0x2, [{@local}, {@multicast1, 0x4}]}, @timestamp={0x44, 0x24, 0x1f, 0x0, 0xc, [0x8000, 0x2, 0x9000, 0x10001, 0x9, 0xf, 0x6, 0x200]}]}}}, @ip_tos_u8={{0x11}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0xe8}, 0x60040000) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) preadv(r1, &(0x7f0000001280)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/168, 0xa8}, {&(0x7f00000011c0)=""/184, 0xb8}], 0x3, 0x8, 0x750) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) getsockopt$inet_opts(r3, 0x0, 0x9, &(0x7f0000001880)=""/75, &(0x7f0000001900)=0x4b) mmap(&(0x7f000048a000/0x2000)=nil, 0x2000, 0x1, 0x1010, r0, 0xaa261000) preadv(0xffffffffffffffff, &(0x7f0000001a40)=[{&(0x7f0000001a80)=""/6, 0x6}, {&(0x7f0000001980)=""/138, 0xfffffcfd}], 0x2, 0xd9f, 0x700000) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="687567653d6e6576fdffffff"]) [ 190.271685][T14622] loop4: detected capacity change from 0 to 4096 [ 190.289616][T14622] EXT4-fs (loop4): unsupported descriptor size 0 [ 190.322864][T14631] loop3: detected capacity change from 0 to 4096 [ 190.340991][T14630] loop2: detected capacity change from 0 to 264192 [ 190.385585][T14636] tmpfs: Bad value for 'huge' [ 190.399748][T14631] EXT4-fs (loop3): unsupported descriptor size 0 [ 190.432335][T14643] tmpfs: Bad value for 'huge' 05:57:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x7fff0000, 0x0, 0x0, 0x0, 0x0) 05:57:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:37 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x13, r1, 0x33703000) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB]) 05:57:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:37 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8400fffffffa) 05:57:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='Huge=never,\x00']) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = io_uring_setup(0x46a2, &(0x7f0000000100)={0x0, 0x24f9, 0x4, 0x0, 0x12f, 0x0, r1}) sendfile(r1, r2, &(0x7f0000000180), 0x8ff) 05:57:37 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 190.998661][T14663] loop3: detected capacity change from 0 to 4096 [ 191.005186][T14665] loop4: detected capacity change from 0 to 4096 [ 191.011729][T14668] loop2: detected capacity change from 0 to 264192 [ 191.020252][T14663] EXT4-fs (loop3): unsupported descriptor size 0 [ 191.022208][T14669] loop1: detected capacity change from 0 to 264192 [ 191.036095][T14665] EXT4-fs (loop4): unsupported descriptor size 0 [ 191.094122][T14683] tmpfs: Unknown parameter 'Huge' 05:57:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) [ 191.209609][T14694] loop2: detected capacity change from 0 to 264192 [ 191.231174][T14698] loop4: detected capacity change from 0 to 4096 [ 191.237832][T14700] loop3: detected capacity change from 0 to 4096 05:57:38 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 191.277579][T14700] EXT4-fs (loop3): unsupported descriptor size 0 [ 191.286329][T14698] EXT4-fs (loop4): unsupported descriptor size 0 [ 191.359977][T14719] loop2: detected capacity change from 0 to 264192 05:57:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xa1cb1200, 0x0, 0x0, 0x0, 0x0) 05:57:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) kcmp(0xffffffffffffffff, r1, 0x4, r0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='hugY(never,\x00']) 05:57:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:38 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:38 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffa) [ 191.833231][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 191.833243][ T25] audit: type=1326 audit(1619675858.721:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14657 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 191.921433][T14736] loop4: detected capacity change from 0 to 4096 [ 191.933189][T14736] EXT4-fs (loop4): unsupported descriptor size 0 [ 191.939828][T14737] loop1: detected capacity change from 0 to 264192 [ 191.944124][T14744] loop3: detected capacity change from 0 to 4096 [ 191.955424][T14744] EXT4-fs (loop3): unsupported descriptor size 0 [ 191.958024][T14742] loop2: detected capacity change from 0 to 264192 05:57:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000780)={'ip6_vti0\x00', 0x0, 0x29, 0x9, 0x5, 0x4, 0x20, @local, @empty, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$inet(r2, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000200)="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", 0xff}, {&(0x7f0000000300)="b17f4eb46138769cbd1e397e4a41d1d3be92b4ab5a885f4063809e201e060c2d16abe4bbf757717cfa936c95e7b1d2d67b4fb4a42ef6e3cfab8c9c39a6a30979adf970a44910c842bb7fa151cd784d2b35f5ef6adab0c2ed7c", 0x59}, {&(0x7f0000000380)="d9fb4f0fbd71773ea64ec4edb9de8a20611dfa8195e163c4c21ad7e2819c40a8b193cc14e261b34c4e340d27a225c09bdde90bfca2f694902eaa338e3490f0404d509e9fa40efcd41e48c16dbeea6e3d067d4799bc8de32c7523ee58d65f8bfd63f4c24f3496b295887db1a0003d4999305bbb5f524105d735ec639267ddc01d24e02a0cb228bf56fa865e554e2434c25e213511647790", 0x97}, {&(0x7f0000000440)="a5760859514418d59aaadfd860ad3cf1118c678a4eb5f1429cb427001b2762e2ec8663d9dc1d755203980e9bfa24cf5639f38c7dc86af373de90a9f73eeace4b6a3251eaa06f5c5c15696e60344e20c821f01dd9a76ecc90a95c111d3a8f0978d9ade3bdaf5950577103571d5ebeb2fcd234c622c6b866adb0935ce31dfce7cb1b701acac2114511fc82f82b0b9d7f95f3f1344fdb26aeaa866dd0bdd97c71073ec4169e31590153e9ee57f5c6d5536ff8", 0xb1}, {&(0x7f0000000500)="fb8b980cb2f4751c556c08f88fe7a331621fbe4b169be9ab0c279f148178351ef4af35ba366fea38a5f06a0dc0fcca482aa594ab8a4eff40933313d790d951d94b9a681f687675e1c7608b8560df687bd59331c8", 0x54}, {&(0x7f0000000580)="b78540387e5219d36fdf1f625c9f4e8e2c0423701a9144515c7cd4f43a3525e912a8713551cf41f18596a0d34bac3431630c2ed61441ce8511a08acaa37fb0bfae8bc387309d0ec714365518498285511aed5f5f28", 0x55}, {&(0x7f0000000600)="2930de7271e95adc60d19cc77f1496cb1c3cf99a222b2f950bc8b846113c36b56443e5be72dbc63e419e155458471603865fa9c217e877d2acd03a9363659e7ed18981c9b72333", 0x47}, {&(0x7f0000000680)="238c3a4afa43b7f0ffd14e7f1ee4465fa185155c754a5febd586e71b6f65ed5afbbbcce549c52d51c33cb8cdab7c4d70cf4277f7021475c6a54202ce18d19d85f324783463218ae4078ea0a82c4494d0c1de4666c56a421a98ea06bf0d8572b6e6a8", 0x62}], 0x8, &(0x7f00000008c0)=ANY=[@ANYBLOB="14000000000000000000000001000000fcffffff000000001c000000000000000000000008000000", @ANYRES32=r3, @ANYBLOB="60010100000b00804056000000000004040000000000000000eaf06435682c52f09b754fc96f9ed6aa1af7fb633c4b0153e4e55a788eff210a692330d6e6071966ceb2a417fb3529dadf", @ANYRES32=0x0, @ANYBLOB="6401010264010100000000001c000000000000000000000007000000890b5a00000000ac1414bb0000000000"], 0x78}, 0x18000) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) r4 = dup3(r0, r1, 0x80000) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="68757665722c00238259c8bc24ddc2575e9a6e04"]) r5 = accept4$inet(r4, &(0x7f0000000800)={0x2, 0x0, @multicast2}, &(0x7f0000000840)=0x10, 0xc0000) connect(r5, &(0x7f0000000980)=@ieee802154={0x24, @none={0x0, 0xffff}}, 0x80) [ 191.970598][ T25] audit: type=1326 audit(1619675858.861:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14732 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:39 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x604000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x200, 0x4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) [ 192.085215][T14761] tmpfs: Unknown parameter 'huver' [ 192.085239][T14760] loop3: detected capacity change from 0 to 4096 [ 192.098469][T14763] tmpfs: Unknown parameter 'huver' [ 192.134297][T14760] EXT4-fs (loop3): unsupported descriptor size 0 [ 192.159147][T14769] loop4: detected capacity change from 0 to 4096 [ 192.165667][T14771] loop2: detected capacity change from 0 to 264192 05:57:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 192.185892][T14769] EXT4-fs (loop4): unsupported descriptor size 0 [ 192.295399][T14784] loop3: detected capacity change from 0 to 4096 [ 192.329228][T14784] EXT4-fs (loop3): unsupported descriptor size 0 [ 192.767010][ T25] audit: type=1326 audit(1619675859.651:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14732 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xa1ffffff, 0x0, 0x0, 0x0, 0x0) 05:57:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x82) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vxcan1\x00'}) fcntl$getown(r1, 0x9) mmap(&(0x7f0000392000/0x1000)=nil, 0x1000, 0x3, 0x50, r0, 0xe82f8000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000580)={0xfffffffd, 0xffff49d8, 0x11, 0xb4, 0x3, 0x9}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000056340f240368bd854ef6f8fe06480dfdf8d2ec9dd7bf06ac514d8adb540799dad84dc23301000000fdcc5aae3746a5f8785ed270c5665a19fb319bab00000000fc95233e97ebaffcb349f5ecaa638272e8e104fb4b24da8eff86dbe5d5c55ffdbab9f1983d9a0eee4087733102aebdb00c72a7c37e53c9d3e6fddb71652d72fcd7df39cea731455e80020000"]) r3 = syz_mount_image$nfs(&(0x7f0000000140), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="a8c4a35e7d291e94437fa7f5c3e0f0c0d882894ce1579ee7c451ef765afe7537a1b22f9983f5dd9bff0de1c7556a8515aaa1c2c90c565730de57de743b16e14044af53b4998ebc751397d4b6e144a3346a078623c1faebbc8538efb7cbce5c37318aca25c2ee0e28e71d57bd4bf2286b5b84a737481fbc3d78119c0acb29a3417d55124f73c7e4bb37e55ef9fc25a8efe47d2f37da2f1388136d97c632a84b4b0c3d3284d841a74d78afa5690d187216721333a9f985b0d1b44b94494783b0e5427e57bf8b16375fe40bc69d73c8c595820339c36b6abba91882a3d1d8", 0xdd, 0x5}, {&(0x7f0000000380)="1914693a104e897ab9e11ac692f4a40f47baff084e97bcedd72a23cd4247dda7d30dd020d420b5ea32c61485099f3bcb8591746231a302b6da62eb372ee724859876edab72f67e89d7778450e4e13d8753818fa595220a97b5c7a1957ff6ad9db280", 0x62}], 0x4080, &(0x7f0000000440)={[{'vxcan1\x00'}, {'-$:*~)\\\\\\-,-'}, {'tmpfs\x00'}, {'$-%[{&:,%#\xdd$-.-'}, {'(^)!\xbc('}], [{@audit}, {@subj_role={'subj_role', 0x3d, '-'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x31, 0x33, 0x37, 0x61, 0x35, 0x34, 0x67], 0x2d, [0x63, 0x37, 0x63, 0x62], 0x2d, [0x33, 0x31, 0x2, 0x34], 0x2d, [0x0, 0x31, 0x63, 0x38], 0x2d, [0x34, 0x33, 0x34, 0x17, 0x5d, 0x61, 0x30, 0x38]}}}, {@smackfshat={'smackfshat', 0x3d, '(}'}}, {@hash}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@fowner_lt={'fowner<', 0xee01}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) renameat2(r1, &(0x7f0000000100)='./file0\x00', r3, &(0x7f0000000540)='./file0\x00', 0x3) 05:57:39 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:39 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffa) [ 192.867660][ T25] audit: type=1326 audit(1619675859.751:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14801 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 192.893542][T14804] loop4: detected capacity change from 0 to 4096 [ 192.900265][T14808] loop3: detected capacity change from 0 to 4096 05:57:39 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB]) [ 192.912957][T14809] loop2: detected capacity change from 0 to 264192 [ 192.919977][T14804] EXT4-fs (loop4): unsupported descriptor size 0 [ 192.928294][T14808] EXT4-fs (loop3): unsupported descriptor size 0 05:57:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 193.033877][T14826] loop2: detected capacity change from 0 to 264192 [ 193.041487][T14834] loop3: detected capacity change from 0 to 4096 [ 193.048050][T14835] loop1: detected capacity change from 0 to 264192 [ 193.055061][T14828] loop4: detected capacity change from 0 to 4096 [ 193.074163][T14828] EXT4-fs (loop4): unsupported descriptor size 0 [ 193.080788][T14834] EXT4-fs (loop3): unsupported descriptor size 0 05:57:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f0000000140)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}]}, 0x6) 05:57:40 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x900000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 193.189030][T14848] loop2: detected capacity change from 0 to 264192 [ 193.695994][ T25] audit: type=1326 audit(1619675860.581:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14801 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xba010000, 0x0, 0x0, 0x0, 0x0) 05:57:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x111080, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000100)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x400, &(0x7f00000000c0)=ANY=[]) 05:57:40 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:40 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffa) [ 193.790525][ T25] audit: type=1326 audit(1619675860.681:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14870 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 193.792489][T14874] loop4: detected capacity change from 0 to 4096 [ 193.814651][T14873] loop1: detected capacity change from 0 to 264192 [ 193.827612][T14874] EXT4-fs (loop4): unsupported descriptor size 0 [ 193.841025][T14879] loop3: detected capacity change from 0 to 4096 [ 193.845236][T14878] loop2: detected capacity change from 0 to 264192 [ 193.853803][T14882] tmpfs: Unknown parameter './file1' [ 193.876749][T14879] EXT4-fs (loop3): unsupported descriptor size 0 05:57:40 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xb00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='hn`e=never,\x00']) 05:57:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$packet(r0, &(0x7f0000001480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000014c0)=0x14) preadv(r1, &(0x7f0000000280), 0x0, 0xd9f, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) signalfd(r2, &(0x7f0000001500)={[0x401]}, 0x8) r3 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001540)='./file0\x00', &(0x7f0000001580)={0x30400, 0x8, 0x3}, 0x18) r4 = openat2(r3, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x180, 0x80, 0x2}, 0x18) sendmsg$inet(r4, &(0x7f0000001440)={&(0x7f0000000180)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000001340)=[{&(0x7f00000001c0)="ddd92e72569e5ad1eda72ef729ca0e4a7f84a59833a80fe5435f4bf105767dfe9649baf33726b80b98403fc673a2916ee64a8237ef64d3b7186c7bd6707a38d529a6a93feab77ab2eda8ea536cb7cf9be38cd51f7491ac60b7d264650c283c0e9574e615a0dd55", 0x67}, {&(0x7f0000000240)="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", 0xff}, {&(0x7f0000000340)="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", 0x1000}], 0x3, &(0x7f0000001380)=[@ip_retopts={{0x84, 0x0, 0x7, {[@rr={0x7, 0x17, 0xec, [@local, @broadcast, @multicast1, @multicast2, @broadcast]}, @lsrr={0x83, 0x1b, 0x8d, [@empty, @loopback, @private=0xa010100, @remote, @rand_addr=0x64010100, @private=0xa010100]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x1c, 0x7d, 0x3, 0x4, [{@dev={0xac, 0x14, 0x14, 0x3e}, 0x400}, {@rand_addr=0x64010102, 0x7}, {@broadcast, 0x80008}]}, @rr={0x7, 0x1b, 0xee, [@private=0xa010100, @dev={0xac, 0x14, 0x14, 0x20}, @dev={0xac, 0x14, 0x14, 0xc}, @multicast1, @remote, @local]}]}}}], 0x88}, 0x4051) [ 193.964484][T14900] tmpfs: Unknown parameter 'hn`e' [ 193.975547][T14898] loop4: detected capacity change from 0 to 4096 [ 194.002953][T14898] EXT4-fs (loop4): unsupported descriptor size 0 05:57:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 194.032641][T14909] loop2: detected capacity change from 0 to 264192 [ 194.040954][T14913] loop3: detected capacity change from 0 to 4096 [ 194.063453][T14913] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 194.152761][T14925] loop4: detected capacity change from 0 to 4096 [ 194.163274][T14925] EXT4-fs (loop4): unsupported descriptor size 0 [ 194.620007][ T25] audit: type=1326 audit(1619675861.511:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14870 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xd4000000, 0x0, 0x0, 0x0, 0x0) 05:57:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:41 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xc00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000004, 0x10, r1, 0xb3aff000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/230, 0xe6}], 0x1, 0xdbc, 0x8) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x448, &(0x7f0000000240)=ANY=[@ANYBLOB="069ca0000000cd00204c72d9fc", @ANYRESHEX=r0, @ANYBLOB="3263a31663945b0d41be969752dc42"]) 05:57:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:41 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x0) 05:57:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 194.711353][T14947] loop3: detected capacity change from 0 to 4096 [ 194.717868][T14949] loop4: detected capacity change from 0 to 4096 [ 194.721255][T14948] tmpfs: Unknown parameter 'œ ' [ 194.729312][T14949] EXT4-fs (loop4): unsupported descriptor size 0 [ 194.735880][T14952] loop1: detected capacity change from 0 to 264192 [ 194.746984][T14954] loop2: detected capacity change from 0 to 264192 [ 194.754511][T14947] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:57:41 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xd00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 194.762260][ T25] audit: type=1326 audit(1619675861.651:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14946 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f00000000c0)={0x8000, 0x8001, 0x9, 0x5, 0x58}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="eaf031b547200eb6f8fdd1440f062b04d9571d0cf7a14e1dfa150559a9fa4e54794ee45bd1d0e356aa864377841b405e3e2c634d3fd30503f4e5a5f0d48fa1c549fa1592beeef4a6cd6a7f27732a137eb2f9797dfd7d64e75e86dd8da5960a52e2d1a89e0429d01bdea4ce61da3ae2187bc5d80121234e60544c4a4a1eee314a3268932e4688d8cc35c1f94426552cfd3571e83dee73e12d61068c5127c46ee7ca3fde00"/186]) 05:57:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:41 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xe00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 194.852482][T14970] loop4: detected capacity change from 0 to 4096 [ 194.891155][T14970] EXT4-fs (loop4): unsupported descriptor size 0 05:57:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x7463, &(0x7f0000000180), &(0x7f00003b2000/0x800000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x4, 0x0, 0x3ff}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0xfffffffc) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) syz_io_uring_submit(r1, 0x0, &(0x7f0000003b00)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000003ac0)={&(0x7f0000000100)=@ieee802154={0x24, @none={0x0, 0x3}}, 0x80, &(0x7f0000002580)=[{&(0x7f0000000180)="29d28e70274da1f03c4874a83eb1a5d7d5544735e8fcc000c238d71c0245ffeebe92e9936f14d50f96c775a92157386960c52ab326140160e8c9a7cf9028b15d5664a16adb03d0ae8ab2e8024c23e69791cfc4dd93ce62d8f3cab2956c33f246ca", 0x61}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="847553339808cee40e3c416b84b67a2227d33a68fef63315771890799b20badcc11264660d1c46da8cd90b9e8c420457d18407caee44937352276b2a73afde6b0926e68025796304712874fa82db2dd8755055069dccb784b79d6b2dbc5b5197133239ceea93c1b47510557eb6399ed578d9a0ceedf717f4f0121807d0004a85435bb8ea5db877f6ef8e6a4fe5be34faebf419e92d88202b", 0x98}, {&(0x7f00000012c0)="8a3a8cbf4c3bd428c6dd79b6d58661de7d7ab9c972a3716aae5f411b96abf6ef98d44464ddc41aa5aff07dc1d5b0dce2fed2936e6c1136d6a3b760926dd7b6f4077a15e23676acb2cf2cadf69c9a62af24c24426a01ae5554a757dba4f5e4302c0e0a85d66133422c835c132da8683344adced4bdac8a781611d9f2459aa651b8c33ab8e804c46fc2fff92e589134400c3fac6549e21b68dfa56f0b87906da23375dc1ace0b49f23103b075c3be9a4738f75118ca71fdab8c37fa2468e9d85260874886a8d1858c37eed230ff96eef175d951b", 0xd3}, {&(0x7f00000013c0)="8b978bc3f7bbdf81d2457b24a50ed303c82dc7ce6ff10575ac73efe6e1354d16d10be10ba6539a7ca99a021d7f414096b9ddaf6cf1d5c6f3e0e3ce6782fef49e3804f67a8509f1039b3fc189c1143c72669e1ae1616271bd84bcc540e3d5b1b377e406d0f543bd54a1ad0cb48a583a91d4f1bad5d2073c13076504123b5e8b5762ce2b00201fd11cd4ecc1b1da8d34ec8c1e30769c9f2076c7c888f5db09d29b47b96e36703ffea607", 0xa9}, {&(0x7f0000001480)="1dface128146", 0x6}, {&(0x7f00000014c0)="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", 0x1000}, {&(0x7f00000024c0)="3b2b49f3a301dc41ce9327ddff99cbfab9d4f10bf2a9ad8eae9608b23d3698ec6f3a01add3a692501e3bd33eb643000080b3", 0x32}, {&(0x7f0000002500)="31c6d7dbd50609ceac5128ff3d502efcf09cf308a9917ae058b658fd6692a21fd412b232b4f4232676b12c0c962a19a64e41907085eef4847dedd48fdb678924ea19", 0x42}], 0x9, &(0x7f0000002640)=[{0xe8, 0x104, 0x80, "4380ea297654824e384c31c3e1c36ecb9098625c24312e38d2a347aea67988db817f72a3c8d16a2deaa5d799ed535fc68fc7f6202c2058d905be421095cd413180bfbc82c170d0b6eecc38a30743da3230cf3108f281c525cb207c77d1541e4207d41da1e79b5b38c5b49af492b64b04b5b1acd6356f865ec0b44a3d38b787764e69b0fa356050060e8f7cb0f89d52687395400fd36738d6cad7b99c2bb5a0a10f606d8350cf21304d0759a37271a829f71cd39446d65557d7f21a732489d000279639c4bd71216ff8d3caafe8ae07be8293e2"}, {0x58, 0x0, 0xff, "2d57ffe1d78fe117e52f37c32df0d9a5c15726b619f6681367a5fe5e8ab83eac17302fefba674d65da7c060e1fe9aefe6698a59ae343ebefc2b72e51fe58dd7418421807de"}, {0x68, 0x115, 0x5, "1486479c7aaecaa3f9fc69665394e04db6ad322102c49b41a8ece4a6a8afe286b95e7e46341a2887b188e63ea3ec72c430a1275dd270174b949c92ac87dc54ced8c55b58f3283bade5017e7c0738adb97749849d36"}, {0x80, 0x110, 0x8, "43177635105bcbdc6fd4d9a549113e80ac20cdc4a880cc6592bf554eff2ce6ed890da3b08cdaf5bed5caa6a3f7270eb8f73ec755699d68dc2cd9e5056ee225496e9ab79088ca98e39fcd36a134ff13a38cafe4ff50270a2b7fca941ecf31bb4c9d8cf3bc0695e98acd17afd29e71c5"}, {0x60, 0x19d, 0x3, "2b5d2344a51ab595e4a078b287cb75ccfc01799739438a1bc5686da35617b82269a34f20e6d1f842ba1d0537cf66e74ea2c76f2833edc8554c45c159fdde6870ab6eaad6e9d5180184b0e18fc03a89"}, {0x40, 0x109, 0x8, "56dcaa5944cdfcbbf9a5dad0a75616f58c0d8006107bbd62be5062b1d393e13096b1749736f1921d3cac26c3a6de"}, {0xa0, 0x112, 0x4754e7e0, "75ca77fe3a0bcc1477cd2dc190190e905b3eecb9c404fbf3780240d2d8628a999950ab1adcd1e4e9204082fff833a6dcc61de4f7b1f5f52279405ffb716355956bd86c5d71ec3f9c542989e6b9abfe65b72b42e33683ed7754e509a95fad0584068399d69b3ffb980927d0c367e5a5f28acd2b2d0d55a4212f3beecf5c27475a03e5f540c7e6a60986ac"}, {0x1010, 0x10e, 0x3800, "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"}, {0xf8, 0x1f1, 0xd223, "610f71106380920a1f61ce86fb84dd3e11708384e13db4a723810154492c316c8efafd5733d33fec554cc1ed3e7e1b114aa9ea9cb1f15dc0e6b51550d52015e5938b7e2c0e1d824173583f57e2924b9e3ac047687cc3f55cb0bbf265dbb7e5bc44bdb9105b91c818dacdbf270c79f2fa8f396815ed0c601fec013ad2a9923862cee95857097613b9476db215aa2e071919b74996ce914d8f2d36632ed3d69a16a717d4edba050fb123ee37cf8d3c0df07ebc1dafdc2ed378868f1228cc2da9a843f5925c0012d5a0f7cab1e64b9f1ececc5aa7110bd39ac0f734917fb0f508bede7e"}], 0x1470}, 0x0, 0x40840, 0x1}, 0x7) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='huge=nev,\",\x00']) [ 194.897194][T14981] tmpfs: Unknown parameter 'êð1µG ¶øýÑD+ÙW ÷¡NúY©úNTyNä[ÑÐãVª†Cw„@^>' [ 194.906823][T14983] loop3: detected capacity change from 0 to 4096 [ 194.918266][T14983] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 194.940346][T14982] loop2: detected capacity change from 0 to 264192 [ 194.964427][T14994] tmpfs: Bad value for 'huge' 05:57:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xeaffffff, 0x0, 0x0, 0x0, 0x0) 05:57:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:42 executing program 0: sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x64, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xd968}]}, @TIPC_NLA_MEDIA={0x44, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x66}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x44000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:42 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:42 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x0) [ 195.550346][ T25] audit: type=1326 audit(1619675862.441:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14946 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 195.644533][T15015] loop2: detected capacity change from 0 to 264192 [ 195.651472][T15016] loop3: detected capacity change from 0 to 4096 [ 195.658338][T15021] loop1: detected capacity change from 0 to 264192 [ 195.670087][ T25] audit: type=1326 audit(1619675862.561:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15013 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:42 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 195.693753][T15016] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 195.710367][T15022] loop4: detected capacity change from 0 to 4096 05:57:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000100)) 05:57:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 195.749549][T15022] EXT4-fs (loop4): unsupported descriptor size 0 05:57:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="687567bce1f3f664a89f4933"]) [ 195.834685][T15046] loop2: detected capacity change from 0 to 264192 [ 195.853548][T15053] loop4: detected capacity change from 0 to 4096 [ 195.861426][T15050] loop3: detected capacity change from 0 to 4096 05:57:42 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 195.908264][T15053] EXT4-fs (loop4): unsupported descriptor size 0 [ 195.914880][T15050] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 195.934692][T15059] tmpfs: Unknown parameter 'hug¼áóöd¨ŸI3' [ 196.052287][T15066] loop2: detected capacity change from 0 to 264192 05:57:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x0) 05:57:43 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x0) 05:57:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='h\x00']) clock_gettime(0x0, &(0x7f0000003340)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000003240)=[{{&(0x7f0000000100)=@ieee802154={0x24, @short}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000180)=""/128, 0x80}, {&(0x7f0000000200)=""/115, 0x73}, {&(0x7f0000000280)=""/70, 0x46}, {&(0x7f0000000300)=""/224, 0xe0}, {&(0x7f0000000400)=""/4, 0x4}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/219, 0xdb}, {&(0x7f0000001540)=""/220, 0xdc}], 0x8, &(0x7f00000016c0)=""/248, 0xf8}, 0x9}, {{&(0x7f00000017c0)=@xdp, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/207, 0xcf}], 0x1, &(0x7f0000001980)=""/96, 0x60}, 0x200}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000002e00)=[{&(0x7f0000001a80)=""/204, 0xcc}, {&(0x7f0000001b80)=""/39, 0x27}, {&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000002bc0)=""/160, 0xa0}, {&(0x7f0000002c80)=""/83, 0x53}, {&(0x7f0000002d00)=""/43, 0x2b}, {&(0x7f0000002d40)=""/135, 0x87}], 0x7, &(0x7f0000002e80)=""/243, 0xf3}, 0x3}, {{0x0, 0x0, &(0x7f00000033c0)=[{&(0x7f0000002f80)=""/4, 0x4}, {&(0x7f0000002fc0)=""/22, 0x16}, {&(0x7f0000003000)=""/167, 0xa7}, {&(0x7f00000030c0)=""/109, 0x6d}], 0x4, &(0x7f0000003180)=""/170, 0xaa}, 0x1}], 0x4, 0x10040, &(0x7f0000003380)={r1, r2+10000000}) recvmmsg(r0, &(0x7f0000003a80)=[{{&(0x7f0000003400)=@nl=@unspec, 0x80, &(0x7f0000003500)=[{&(0x7f0000003140)=""/11, 0xb}, {&(0x7f0000003480)=""/72, 0x48}], 0x2, &(0x7f0000003540)=""/48, 0x30}, 0x2}, {{0x0, 0x0, &(0x7f0000003940)=[{&(0x7f0000003580)=""/152, 0x98}, {&(0x7f0000003640)=""/88, 0x58}, {&(0x7f00000036c0)=""/233, 0xe9}, {&(0x7f00000037c0)=""/91, 0x5b}, {&(0x7f0000003840)=""/220, 0xdc}], 0x5, &(0x7f00000039c0)=""/174, 0xae}, 0x1000}], 0x2, 0x12102, &(0x7f0000003b00)={0x0, 0x989680}) 05:57:43 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1100000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:43 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1200000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 196.572310][T15087] loop1: detected capacity change from 0 to 264192 [ 196.572666][T15086] loop2: detected capacity change from 0 to 264192 [ 196.580540][T15088] tmpfs: Unknown parameter 'h' [ 196.598994][T15090] loop3: detected capacity change from 0 to 4096 05:57:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/107, 0x6b}, {&(0x7f0000001180)=""/163, 0xa3}, {&(0x7f0000001240)=""/4, 0x4}, {&(0x7f0000001280)=""/69, 0x45}], 0x5, 0x6, 0x8) [ 196.617076][T15092] loop4: detected capacity change from 0 to 4096 [ 196.626436][T15090] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 196.644336][T15088] tmpfs: Unknown parameter 'h' 05:57:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 196.673587][T15092] EXT4-fs (loop4): unsupported descriptor size 0 [ 196.694099][T15106] loop2: detected capacity change from 0 to 264192 05:57:43 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) mmap(&(0x7f000032d000/0x2000)=nil, 0x2000, 0x2000009, 0x4010, r1, 0xe5efa000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="a2da6f1e25a24cd27900000000000000000000ff9c922a1efb672ecffd60eb6271bf3fbf32a5af43718abd8ccb8841f831e383e5bb00f0d4652422e7e8d1403d829a9e37f4cfd300d80b868c63fab7b40af160ad86fc38dd51b3ebede2644fcab7f88cae14f8bb31f658ae39ce07c7c5d0746c"]) [ 196.769835][T15118] loop3: detected capacity change from 0 to 4096 [ 196.813050][T15118] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 196.835112][T15128] loop4: detected capacity change from 0 to 4096 [ 196.844859][T15129] tmpfs: Unknown parameter '¢Úo%¢LÒy' [ 196.884068][T15128] EXT4-fs (loop4): unsupported descriptor size 0 05:57:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='huee=never,\x00']) 05:57:44 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) 05:57:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xffffffa1, 0x0, 0x0, 0x0, 0x0) 05:57:44 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1900000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 197.407441][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 197.407466][ T25] audit: type=1326 audit(1619675864.291:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15082 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 197.498016][T15156] loop4: detected capacity change from 0 to 4096 [ 197.505129][T15159] loop3: detected capacity change from 0 to 4096 [ 197.512411][T15161] loop2: detected capacity change from 0 to 264192 [ 197.519022][ T25] audit: type=1326 audit(1619675864.401:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15151 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000100)=""/94, 0x5e}, {&(0x7f0000000180)=""/216, 0xd8}, {&(0x7f0000000280)=""/69, 0x45}, {&(0x7f0000000300)=""/245, 0xf5}, {&(0x7f0000000400)=""/78, 0x4e}], 0x5, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) [ 197.522442][T15156] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 197.547280][T15162] tmpfs: Unknown parameter 'huee' [ 197.553579][T15165] loop1: detected capacity change from 0 to 264192 [ 197.573565][T15159] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:57:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:44 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) syz_mount_image$iso9660(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x4, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000180)="79fd7fef75833ac23f8cb9d0c73f72999733f65ad4f6ecf7c5a499b6", 0x1c, 0x10000}], 0x104080, &(0x7f0000000200)={[{@map_off}, {@sbsector={'sbsector', 0x3d, 0x1b}}, {@block={'block', 0x3d, 0x1e00}}, {@unhide}, {@cruft}, {@map_acorn}], [{@fowner_lt={'fowner<', 0xee01}}, {@fowner_lt={'fowner<', 0xee01}}]}) 05:57:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="687567650000008000000000"]) [ 197.716154][T15188] loop3: detected capacity change from 0 to 4096 [ 197.729999][T15188] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 197.746229][T15191] loop4: detected capacity change from 0 to 4096 [ 197.759209][T15195] loop2: detected capacity change from 0 to 264192 [ 197.781011][T15191] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 197.844872][T15210] tmpfs: Bad value for 'huge' [ 197.876595][T15213] loop3: detected capacity change from 0 to 4096 [ 197.891742][T15213] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 198.331687][ T25] audit: type=1326 audit(1619675865.221:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15151 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xffffffea, 0x0, 0x0, 0x0, 0x0) 05:57:45 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2010000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket(0xa, 0x6, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) recvfrom$unix(r1, &(0x7f0000000100)=""/47, 0x2f, 0x0, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r2 = dup2(r0, r0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x31d20000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@huge_never}]}) 05:57:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:45 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) 05:57:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 198.408386][T15228] loop3: detected capacity change from 0 to 4096 [ 198.422531][T15228] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 198.445009][T15232] loop2: detected capacity change from 0 to 264192 [ 198.452051][T15239] loop1: detected capacity change from 0 to 264192 [ 198.459173][ T25] audit: type=1326 audit(1619675865.341:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15234 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 198.483179][T15241] loop4: detected capacity change from 0 to 4096 05:57:45 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2200000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:45 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) [ 198.512307][T15241] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 198.550460][T15259] loop3: detected capacity change from 0 to 4096 05:57:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 198.592411][T15259] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:57:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 198.668827][T15272] loop4: detected capacity change from 0 to 4096 [ 198.687970][T15273] loop2: detected capacity change from 0 to 264192 [ 198.718118][T15278] loop3: detected capacity change from 0 to 4096 [ 198.741547][T15272] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 198.767387][T15278] EXT4-fs (loop3): invalid first ino: 0 05:57:45 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2500000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 198.909352][T15293] loop2: detected capacity change from 0 to 264192 [ 199.282377][ T25] audit: type=1326 audit(1619675866.171:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15234 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0) 05:57:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:46 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3303000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) [ 199.371237][ T25] audit: type=1326 audit(1619675866.261:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15305 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 199.384383][T15313] loop1: detected capacity change from 0 to 264192 [ 199.403685][T15312] loop4: detected capacity change from 0 to 4096 05:57:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 199.419151][T15315] loop2: detected capacity change from 0 to 264192 [ 199.427055][T15314] loop3: detected capacity change from 0 to 4096 [ 199.451570][T15314] EXT4-fs (loop3): invalid first ino: 0 [ 199.457248][T15312] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 05:57:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:46 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3614000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x7) fallocate(r1, 0x1, 0x8001, 0x1) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000477000/0x3000)=nil, 0x3000, 0x9, 0x50, r0, 0x31ff0000) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}]}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:46 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3f00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 199.594344][T15334] loop4: detected capacity change from 0 to 4096 [ 199.647488][T15334] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 199.649580][T15343] loop3: detected capacity change from 0 to 4096 [ 199.663860][T15343] EXT4-fs (loop3): invalid first ino: 0 [ 199.669224][T15347] loop2: detected capacity change from 0 to 264192 05:57:46 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 199.712772][T15354] tmpfs: Bad value for 'mpol' [ 199.831983][T15362] loop2: detected capacity change from 0 to 264192 05:57:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x30000000000, 0x0, 0x0, 0x0, 0x0) 05:57:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x7) fallocate(r1, 0x1, 0x8001, 0x1) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000477000/0x3000)=nil, 0x3000, 0x9, 0x50, r0, 0x31ff0000) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}]}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:47 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4502000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:47 executing program 1 (fault-call:8 fault-nth:0): r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 200.196890][ T25] audit: type=1326 audit(1619675867.081:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15305 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 200.283625][T15380] loop3: detected capacity change from 0 to 4096 [ 200.290615][ T25] audit: type=1326 audit(1619675867.181:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15375 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 200.305739][T15386] tmpfs: Bad value for 'mpol' [ 200.319193][T15384] loop4: detected capacity change from 0 to 4096 05:57:47 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x7) fallocate(r1, 0x1, 0x8001, 0x1) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000477000/0x3000)=nil, 0x3000, 0x9, 0x50, r0, 0x31ff0000) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}]}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 200.328516][T15385] loop2: detected capacity change from 0 to 264192 [ 200.331107][T15387] loop1: detected capacity change from 0 to 264192 [ 200.346507][T15380] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 200.356710][T15384] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 200.416797][T15387] FAULT_INJECTION: forcing a failure. [ 200.416797][T15387] name failslab, interval 1, probability 0, space 0, times 0 [ 200.429497][T15387] CPU: 1 PID: 15387 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 200.438132][T15387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.446690][T15403] tmpfs: Bad value for 'mpol' [ 200.448194][T15387] Call Trace: [ 200.448206][T15387] dump_stack+0x137/0x19d [ 200.460489][T15387] should_fail+0x23c/0x250 05:57:47 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4c00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 200.464926][T15387] __should_failslab+0x81/0x90 [ 200.469708][T15387] ? alloc_pipe_info+0xac/0x350 [ 200.474587][T15387] should_failslab+0x5/0x20 [ 200.479158][T15387] kmem_cache_alloc_trace+0x49/0x310 [ 200.484493][T15387] alloc_pipe_info+0xac/0x350 [ 200.489765][T15387] splice_direct_to_actor+0x5f7/0x650 [ 200.495185][T15387] ? do_splice_direct+0x170/0x170 [ 200.500263][T15387] ? security_file_permission+0x87/0xa0 [ 200.505886][T15387] ? rw_verify_area+0x136/0x250 [ 200.510777][T15387] do_splice_direct+0xf5/0x170 [ 200.515598][T15387] do_sendfile+0x773/0xda0 [ 200.520058][T15387] __x64_sys_sendfile64+0xf2/0x130 [ 200.525192][T15387] do_syscall_64+0x4a/0x90 [ 200.529751][T15387] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 200.535686][T15387] RIP: 0033:0x4665f9 [ 200.539587][T15387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:57:47 executing program 1 (fault-call:8 fault-nth:1): r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x7) fallocate(r1, 0x1, 0x8001, 0x1) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000477000/0x3000)=nil, 0x3000, 0x9, 0x50, r0, 0x31ff0000) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 200.559456][T15387] RSP: 002b:00007f9550ce5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 200.567889][T15387] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 200.575885][T15387] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 200.583886][T15387] RBP: 00007f9550ce51d0 R08: 0000000000000000 R09: 0000000000000000 [ 200.591980][T15387] R10: 00008400fffffffa R11: 0000000000000246 R12: 0000000000000001 [ 200.599962][T15387] R13: 00007fff8de9ee1f R14: 00007f9550ce5300 R15: 0000000000022000 [ 200.641599][T15409] loop4: detected capacity change from 0 to 4096 [ 200.653297][T15413] tmpfs: Bad value for 'mpol' [ 200.658448][T15408] loop2: detected capacity change from 0 to 264192 [ 200.676002][T15409] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 200.699710][T15421] loop1: detected capacity change from 0 to 264192 [ 200.746728][T15421] FAULT_INJECTION: forcing a failure. [ 200.746728][T15421] name failslab, interval 1, probability 0, space 0, times 0 [ 200.759480][T15421] CPU: 0 PID: 15421 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 200.767942][T15421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.778108][T15421] Call Trace: [ 200.781379][T15421] dump_stack+0x137/0x19d [ 200.785707][T15421] should_fail+0x23c/0x250 [ 200.790162][T15421] __should_failslab+0x81/0x90 [ 200.795227][T15421] ? kcalloc+0x32/0x40 [ 200.799634][T15421] should_failslab+0x5/0x20 [ 200.804158][T15421] __kmalloc+0x66/0x350 [ 200.808311][T15421] ? kmem_cache_alloc_trace+0x210/0x310 [ 200.813863][T15421] ? alloc_pipe_info+0xac/0x350 [ 200.818767][T15421] kcalloc+0x32/0x40 [ 200.822716][T15421] alloc_pipe_info+0x1be/0x350 [ 200.827973][T15421] splice_direct_to_actor+0x5f7/0x650 [ 200.833453][T15421] ? do_splice_direct+0x170/0x170 [ 200.838496][T15421] ? security_file_permission+0x87/0xa0 [ 200.844234][T15421] ? rw_verify_area+0x136/0x250 [ 200.849125][T15421] do_splice_direct+0xf5/0x170 [ 200.856016][T15421] do_sendfile+0x773/0xda0 [ 200.860448][T15421] __x64_sys_sendfile64+0xf2/0x130 [ 200.865686][T15421] do_syscall_64+0x4a/0x90 [ 200.870278][T15421] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 200.876236][T15421] RIP: 0033:0x4665f9 [ 200.880213][T15421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 200.899838][T15421] RSP: 002b:00007f9550ce5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 200.908285][T15421] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 200.916332][T15421] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 200.924323][T15421] RBP: 00007f9550ce51d0 R08: 0000000000000000 R09: 0000000000000000 [ 200.932287][T15421] R10: 00008400fffffffa R11: 0000000000000246 R12: 0000000000000001 [ 200.940499][T15421] R13: 00007fff8de9ee1f R14: 00007f9550ce5300 R15: 0000000000022000 05:57:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x50000000000, 0x0, 0x0, 0x0, 0x0) 05:57:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x7) fallocate(r1, 0x1, 0x8001, 0x1) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:48 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:48 executing program 1 (fault-call:8 fault-nth:2): r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 201.117801][ T25] audit: type=1326 audit(1619675868.001:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15375 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 201.209216][ T25] audit: type=1326 audit(1619675868.091:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15437 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 201.221502][T15444] tmpfs: Bad value for 'mpol' [ 201.238504][T15442] loop2: detected capacity change from 0 to 264192 [ 201.238671][T15443] loop3: detected capacity change from 0 to 4096 05:57:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x7) fallocate(r1, 0x1, 0x8001, 0x1) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x7) fallocate(r1, 0x1, 0x8001, 0x1) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 201.256276][T15443] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 201.267491][T15445] loop4: detected capacity change from 0 to 4096 [ 201.273993][T15441] loop1: detected capacity change from 0 to 264192 [ 201.285080][T15455] tmpfs: Bad value for 'mpol' 05:57:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x7) fallocate(r1, 0x1, 0x8001, 0x1) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 201.308422][T15445] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 201.322145][T15463] tmpfs: Bad value for 'mpol' 05:57:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:48 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6c00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 201.350546][T15441] FAULT_INJECTION: forcing a failure. [ 201.350546][T15441] name failslab, interval 1, probability 0, space 0, times 0 [ 201.363252][T15441] CPU: 0 PID: 15441 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 201.371703][T15441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.382015][T15441] Call Trace: [ 201.385300][T15441] dump_stack+0x137/0x19d [ 201.389645][T15441] should_fail+0x23c/0x250 [ 201.394063][T15441] __should_failslab+0x81/0x90 05:57:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 201.398830][T15441] ? kmalloc_array+0x2d/0x40 [ 201.403431][T15441] should_failslab+0x5/0x20 [ 201.407974][T15441] __kmalloc+0x66/0x350 [ 201.412148][T15441] ? mntput_no_expire+0x64/0x740 [ 201.412884][T15466] tmpfs: Bad value for 'mpol' [ 201.417096][T15441] ? splice_from_pipe+0xc0/0xc0 [ 201.417122][T15441] kmalloc_array+0x2d/0x40 [ 201.431057][T15441] iter_file_splice_write+0xc1/0x750 [ 201.436473][T15441] ? atime_needs_update+0xda/0x390 [ 201.441623][T15441] ? generic_file_splice_read+0x284/0x310 [ 201.447403][T15441] ? splice_from_pipe+0xc0/0xc0 [ 201.452284][T15441] direct_splice_actor+0x80/0xa0 [ 201.457259][T15441] splice_direct_to_actor+0x345/0x650 [ 201.462860][T15441] ? do_splice_direct+0x170/0x170 [ 201.468009][T15441] do_splice_direct+0xf5/0x170 [ 201.472631][T15468] loop3: detected capacity change from 0 to 4096 [ 201.472792][T15441] do_sendfile+0x773/0xda0 [ 201.483553][T15441] __x64_sys_sendfile64+0xf2/0x130 [ 201.488828][T15441] do_syscall_64+0x4a/0x90 [ 201.493255][T15441] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 201.499282][T15441] RIP: 0033:0x4665f9 [ 201.504320][T15441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 201.523953][T15441] RSP: 002b:00007f9550ce5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 201.532408][T15441] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 201.540390][T15441] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 201.548368][T15441] RBP: 00007f9550ce51d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.556444][T15441] R10: 00008400fffffffa R11: 0000000000000246 R12: 0000000000000001 [ 201.564434][T15441] R13: 00007fff8de9ee1f R14: 00007f9550ce5300 R15: 0000000000022000 [ 201.582203][T15468] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 201.609211][T15476] loop2: detected capacity change from 0 to 264192 05:57:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xc07f00000000, 0x0, 0x0, 0x0, 0x0) 05:57:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:48 executing program 1 (fault-call:8 fault-nth:3): r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:48 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 202.134828][T15495] loop2: detected capacity change from 0 to 264192 [ 202.136939][T15500] loop4: detected capacity change from 0 to 4096 [ 202.143156][T15498] loop1: detected capacity change from 0 to 264192 [ 202.147837][T15496] loop3: detected capacity change from 0 to 4096 [ 202.165250][T15499] tmpfs: Bad value for 'mpol' [ 202.173287][T15498] FAULT_INJECTION: forcing a failure. [ 202.173287][T15498] name failslab, interval 1, probability 0, space 0, times 0 [ 202.185944][T15498] CPU: 1 PID: 15498 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 202.194501][T15498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.200909][T15500] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 202.204687][T15498] Call Trace: [ 202.204699][T15498] dump_stack+0x137/0x19d [ 202.223588][T15498] should_fail+0x23c/0x250 [ 202.228014][T15498] ? mempool_alloc_slab+0x16/0x20 [ 202.233070][T15498] __should_failslab+0x81/0x90 [ 202.237899][T15498] should_failslab+0x5/0x20 [ 202.242419][T15498] kmem_cache_alloc+0x46/0x2e0 [ 202.247213][T15498] mempool_alloc_slab+0x16/0x20 [ 202.252147][T15498] ? mempool_free+0x130/0x130 [ 202.256837][T15498] mempool_alloc+0x8c/0x300 [ 202.261417][T15498] ? mark_page_accessed+0x1e3/0x530 [ 202.266672][T15498] ? __find_get_block+0x6f8/0x8e0 [ 202.271734][T15498] bio_alloc_bioset+0xcc/0x480 [ 202.276504][T15498] ? __cond_resched+0x11/0x40 [ 202.281256][T15498] ? __getblk_gfp+0x3f/0x560 [ 202.285873][T15498] ? blk_mq_sched_insert_request+0x127/0x280 [ 202.291945][T15498] submit_bh_wbc+0x130/0x330 [ 202.296568][T15498] write_dirty_buffer+0xde/0xf0 [ 202.301467][T15498] fat_sync_bhs+0x52/0x160 [ 202.305910][T15498] fat_alloc_clusters+0x909/0xa50 [ 202.310934][T15498] ? sched_clock_cpu+0x11/0x180 [ 202.315814][T15498] ? __cgroup_account_cputime+0xb6/0x1e0 [ 202.321461][T15498] ? select_idle_sibling+0x3be/0x550 [ 202.326867][T15498] fat_get_block+0x213/0x5a0 [ 202.331479][T15498] __block_write_begin_int+0x4a2/0x1060 [ 202.337093][T15498] ? fat_block_truncate_page+0x30/0x30 [ 202.342567][T15498] ? wait_for_stable_page+0x56/0x70 [ 202.347786][T15498] cont_write_begin+0x522/0x850 [ 202.352648][T15498] fat_write_begin+0x61/0xf0 [ 202.357280][T15498] ? fat_block_truncate_page+0x30/0x30 [ 202.362750][T15498] generic_perform_write+0x196/0x3a0 [ 202.368046][T15498] ? file_update_time+0x3ae/0x3e0 [ 202.373079][T15498] __generic_file_write_iter+0x161/0x300 [ 202.378722][T15498] ? generic_write_checks+0x250/0x290 [ 202.384127][T15498] generic_file_write_iter+0x75/0x130 [ 202.389520][T15498] do_iter_readv_writev+0x2cb/0x360 [ 202.394756][T15498] do_iter_write+0x112/0x4c0 [ 202.399404][T15498] ? kmalloc_array+0x2d/0x40 [ 202.404050][T15498] vfs_iter_write+0x4c/0x70 [ 202.408560][T15498] iter_file_splice_write+0x40a/0x750 [ 202.413961][T15498] ? splice_from_pipe+0xc0/0xc0 [ 202.418888][T15498] direct_splice_actor+0x80/0xa0 [ 202.423843][T15498] splice_direct_to_actor+0x345/0x650 [ 202.429299][T15498] ? do_splice_direct+0x170/0x170 [ 202.434374][T15498] do_splice_direct+0xf5/0x170 [ 202.439198][T15498] do_sendfile+0x773/0xda0 [ 202.443669][T15498] __x64_sys_sendfile64+0xf2/0x130 [ 202.448841][T15498] do_syscall_64+0x4a/0x90 [ 202.453296][T15498] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 202.459203][T15498] RIP: 0033:0x4665f9 [ 202.463140][T15498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:57:49 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7a00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 202.483014][T15498] RSP: 002b:00007f9550ce5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 202.491467][T15498] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 202.500106][T15498] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 202.508115][T15498] RBP: 00007f9550ce51d0 R08: 0000000000000000 R09: 0000000000000000 [ 202.516185][T15498] R10: 00008400fffffffa R11: 0000000000000246 R12: 0000000000000001 [ 202.524181][T15498] R13: 00007fff8de9ee1f R14: 00007f9550ce5300 R15: 0000000000022000 [ 202.545551][T15496] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 05:57:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 202.591004][T15516] tmpfs: Bad value for 'mpol' 05:57:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 202.649936][T15521] loop2: detected capacity change from 0 to 264192 [ 202.653110][T15525] tmpfs: Bad value for 'mpol' [ 202.729426][T15534] loop4: detected capacity change from 0 to 4096 [ 202.730111][T15535] tmpfs: Bad value for 'mpol' [ 202.743979][T15537] loop3: detected capacity change from 0 to 4096 [ 202.751613][T15534] EXT4-fs (loop4): invalid first ino: 0 [ 202.797183][T15537] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 05:57:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xf07f00000000, 0x0, 0x0, 0x0, 0x0) 05:57:49 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7fffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:49 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 202.968823][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 202.968835][ T25] audit: type=1326 audit(1619675869.851:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15493 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 203.062048][T15559] loop2: detected capacity change from 0 to 264192 [ 203.081415][ T25] audit: type=1326 audit(1619675869.971:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15554 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:50 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8cffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 203.110887][T15565] tmpfs: Bad value for 'mpol' [ 203.119030][T15561] loop3: detected capacity change from 0 to 4096 [ 203.129495][T15567] loop4: detected capacity change from 0 to 4096 [ 203.139849][T15567] EXT4-fs (loop4): invalid first ino: 0 [ 203.161394][T15561] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 203.165253][T15575] loop1: detected capacity change from 0 to 264192 [ 203.178409][T15579] tmpfs: Bad value for 'mpol' 05:57:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:50 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 203.260592][T15594] loop3: detected capacity change from 0 to 4096 [ 203.263177][T15590] loop2: detected capacity change from 0 to 264192 05:57:50 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 203.303738][T15599] loop4: detected capacity change from 0 to 4096 [ 203.323589][T15599] EXT4-fs (loop4): invalid first ino: 0 [ 203.329845][T15602] tmpfs: Bad value for 'mpol' [ 203.337283][T15594] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 203.366696][T15605] tmpfs: Bad value for 'mpol' 05:57:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xfc7f00000000, 0x0, 0x0, 0x0, 0x0) 05:57:50 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xba01000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:50 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:50 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x7ffff000) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 203.905058][ T25] audit: type=1326 audit(1619675870.791:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15554 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 203.995385][T15626] loop1: detected capacity change from 0 to 264192 [ 204.013045][T15625] loop4: detected capacity change from 0 to 4096 [ 204.020284][T15627] loop3: detected capacity change from 0 to 4096 [ 204.022537][T15631] tmpfs: Bad value for 'mpol' [ 204.039261][T15627] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 204.047941][ T25] audit: type=1326 audit(1619675870.931:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15622 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 204.074876][T15636] loop2: detected capacity change from 0 to 264192 05:57:51 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 204.096232][T15625] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 05:57:51 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xcb00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 204.142945][T15645] tmpfs: Bad value for 'mpol' 05:57:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:51 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:51 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xde00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 204.252318][T15658] loop3: detected capacity change from 0 to 4096 [ 204.277684][T15658] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 204.283398][T15662] tmpfs: Bad value for 'mpol' [ 204.286137][T15661] loop4: detected capacity change from 0 to 4096 [ 204.301484][T15661] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 204.350497][T15673] loop2: detected capacity change from 0 to 264192 05:57:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xff7f00000000, 0x0, 0x0, 0x0, 0x0) 05:57:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:51 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:51 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:51 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf0ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 204.835581][ T25] audit: type=1326 audit(1619675871.721:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15622 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 204.925331][T15695] tmpfs: Bad value for 'mpol' [ 204.930364][T15694] loop3: detected capacity change from 0 to 4096 [ 204.936885][T15692] loop2: detected capacity change from 0 to 264192 [ 204.944211][T15698] loop4: detected capacity change from 0 to 4096 [ 204.953574][T15699] loop1: detected capacity change from 0 to 264192 [ 204.955931][T15694] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 05:57:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:51 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 204.977640][ T25] audit: type=1326 audit(1619675871.861:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15693 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 205.007189][T15698] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 05:57:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r3 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x400000ffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES64=r0, @ANYRES64=r0, @ANYRES16=r1, @ANYBLOB="a12dd4ba8d0ea74f0a4564f4ecd7ac6620a4fafd23e7e4a14eee64a8d254e58cfd4d30949f77951e58683a751255f873462b827517909bb0eb67d64b17b35f970fa811d8527caf52fb3222e99e2c7fc67ecf2dcce74eaf336aeefa4ef40ad383b2acff37", @ANYRESDEC, @ANYRES16=r2, @ANYRESDEC=r1]) chdir(&(0x7f0000000000)='./file1\x00') r4 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r5 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r5, 0x1000) lseek(r5, 0x0, 0x2) dup2(r3, 0xffffffffffffffff) r6 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffa) 05:57:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 205.125296][T15726] loop2: detected capacity change from 0 to 264192 [ 205.131206][T15729] loop4: detected capacity change from 0 to 4096 [ 205.143972][T15728] loop1: detected capacity change from 0 to 264192 [ 205.149648][T15730] loop3: detected capacity change from 0 to 4096 05:57:52 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf9fdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 205.167270][T15728] FAT-fs (loop1): Unrecognized mount option "00000000000000000000003" or missing value [ 205.191047][T15729] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 205.205669][T15730] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 205.261345][T15748] loop2: detected capacity change from 0 to 264192 [ 205.776473][ T25] audit: type=1326 audit(1619675872.661:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15693 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0) 05:57:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:52 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfc07000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:52 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfdfdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 205.875321][ T25] audit: type=1326 audit(1619675872.761:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15763 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 205.899194][T15766] loop2: detected capacity change from 0 to 264192 [ 205.915972][T15764] loop3: detected capacity change from 0 to 4096 05:57:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 205.922468][T15768] loop4: detected capacity change from 0 to 4096 [ 205.938497][T15764] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 205.970123][T15768] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 205.975974][T15782] loop1: detected capacity change from 0 to 264192 [ 206.001005][T15786] tmpfs: Bad value for 'mpol' 05:57:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 206.011109][T15782] FAT-fs (loop1): Unrecognized mount option "00000000000000000000003" or missing value [ 206.030762][T15785] loop2: detected capacity change from 0 to 264192 [ 206.126720][T15795] loop3: detected capacity change from 0 to 4096 [ 206.138500][T15795] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:57:53 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) lstat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:53 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfeffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 206.226678][T15815] loop4: detected capacity change from 0 to 4096 [ 206.233833][T15820] tmpfs: Bad value for 'mpol' [ 206.238672][T15819] loop2: detected capacity change from 0 to 264192 [ 206.238688][T15815] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 206.245338][T15818] loop1: detected capacity change from 0 to 264192 05:57:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0) 05:57:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:53 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfeffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:53 executing program 1: shmdt(0x0) r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./bus\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x13) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000180)='./file1\x00', 0x480201, 0xe8) sendfile(r1, r4, 0x0, 0x8400fffffffa) syz_open_dev$vcsu(&(0x7f0000000140), 0x3, 0x501821) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0), r3) [ 206.707998][ T25] audit: type=1326 audit(1619675873.591:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15763 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 206.794190][T15850] loop3: detected capacity change from 0 to 4096 [ 206.803747][T15850] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 206.809251][T15856] tmpfs: Bad value for 'mpol' [ 206.815390][ T25] audit: type=1326 audit(1619675873.701:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15846 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 206.839800][T15848] loop1: detected capacity change from 0 to 264192 [ 206.849609][T15855] loop2: detected capacity change from 0 to 264192 [ 206.856365][T15849] loop4: detected capacity change from 0 to 4096 05:57:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 206.884866][T15869] tmpfs: Bad value for 'mpol' [ 206.899994][T15849] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 05:57:53 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xff0f000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, 0x0) 05:57:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 206.964862][T15874] loop3: detected capacity change from 0 to 4096 [ 206.974678][T15874] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 207.009288][T15876] loop2: detected capacity change from 0 to 264192 [ 207.037073][T15887] tmpfs: Bad value for 'mpol' [ 207.059028][T15890] loop3: detected capacity change from 0 to 4096 [ 207.080646][T15892] loop4: detected capacity change from 0 to 4096 [ 207.101729][T15892] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 05:57:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x30000000000000, 0x0, 0x0, 0x0, 0x0) 05:57:54 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfff7ffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, 0x0) 05:57:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:54 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000140)='./bus\x00', 0xff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x1}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:57:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 207.715831][T15916] tmpfs: Bad value for 'mpol' [ 207.724089][T15920] loop2: detected capacity change from 0 to 264192 [ 207.725403][T15919] loop3: detected capacity change from 0 to 4096 [ 207.730718][T15918] loop4: detected capacity change from 0 to 4096 [ 207.746856][T15918] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 05:57:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:54 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffbffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, 0x0) 05:57:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 207.772265][T15933] tmpfs: Bad value for 'mpol' [ 207.789636][T15932] FAT-fs (loop1): bogus number of reserved sectors [ 207.796209][T15932] FAT-fs (loop1): Can't find a valid FAT filesystem [ 207.804344][T15937] tmpfs: Bad value for 'mpol' 05:57:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 207.821843][T15940] loop4: detected capacity change from 0 to 4096 [ 207.829421][T15940] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 207.839940][T15946] tmpfs: Bad value for 'mpol' [ 207.846464][T15932] FAT-fs (loop1): bogus number of reserved sectors [ 207.853023][T15932] FAT-fs (loop1): Can't find a valid FAT filesystem [ 207.925472][T15956] loop3: detected capacity change from 0 to 4096 [ 207.932281][T15958] loop2: detected capacity change from 0 to 264192 05:57:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x70000000000000, 0x0, 0x0, 0x0, 0x0) 05:57:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:55 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x10000, 0x0) fchmodat(r3, &(0x7f0000000180)='./bus\x00', 0x9a) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000000240)="28def65cf89f0233f07948659785cb940658a5fe568a5974f8e9878188e00fb7350ce5108d07db681158312a55486da7be03d2d1a4a138b1fcd2ba4011205fe54e83838571812f585690c67200ccf67ea43c0f5071712ee0ce6eccdbf23600952f6bd5bb27b4b54d664d507b8002170bf836f62212a6f2ce5f60c5073bde51091c2ab9bad6ed9c8adad561", 0x8b) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r5, 0xc400941d, &(0x7f00000006c0)={0x0, 0x81, 0x9}) sendfile(r2, r4, 0x0, 0x8400fffffffa) r6 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x8400fffffffa) 05:57:55 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffff1f0000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:55 executing program 3: socket(0xa, 0x3, 0x7) [ 208.556867][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 208.556880][ T25] audit: type=1326 audit(1619675875.441:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15911 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 208.628752][ T25] audit: type=1326 audit(1619675875.511:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15976 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 208.652961][T15978] loop4: detected capacity change from 0 to 4096 [ 208.658948][T15987] tmpfs: Bad value for 'mpol' [ 208.665899][T15984] loop2: detected capacity change from 0 to 264192 05:57:55 executing program 3: ioprio_get$pid(0x0, 0xffffffffffffffff) [ 208.673367][T15978] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 208.675797][T15986] loop1: detected capacity change from 0 to 264192 05:57:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:55 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffff7f00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:55 executing program 3: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000380), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) clock_nanosleep(0x7, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) [ 208.797917][T16008] tmpfs: Bad value for 'mpol' 05:57:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 208.832249][T16010] loop4: detected capacity change from 0 to 4096 [ 208.850031][T16016] loop2: detected capacity change from 0 to 264192 [ 208.859898][T16019] tmpfs: Bad value for 'mpol' [ 208.907564][T16010] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 05:57:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0) 05:57:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:56 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:56 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) open(&(0x7f0000000140)='./bus\x00', 0x80, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) setxattr$trusted_overlay_redirect(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), &(0x7f0000000240)='./bus\x00', 0x6, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 209.462278][ T25] audit: type=1326 audit(1619675876.351:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15976 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 209.547179][ T25] audit: type=1326 audit(1619675876.431:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16040 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 209.552327][T16043] loop4: detected capacity change from 0 to 4096 [ 209.580131][T16043] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 209.584942][T16045] tmpfs: Bad value for 'mpol' 05:57:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 209.586741][T16044] loop1: detected capacity change from 0 to 264192 [ 209.598038][T16046] loop2: detected capacity change from 0 to 264192 [ 209.637606][T16058] tmpfs: Bad value for 'mpol' 05:57:56 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffffffffff0700, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={0x0, 0x21}}, 0x0) 05:57:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 209.728613][T16070] loop4: detected capacity change from 0 to 4096 [ 209.741422][T16068] tmpfs: Bad value for 'mpol' [ 209.757154][T16069] loop2: detected capacity change from 0 to 264192 05:57:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 209.787059][T16070] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 05:57:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x907c0000c9ffff, 0x0, 0x0, 0x0, 0x0) 05:57:57 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffffffffffff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:57 executing program 3: faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 05:57:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, &(0x7f00000000c0)=ANY=[]) 05:57:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:57 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = dup2(r0, 0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x4c42) dup3(r6, r3, 0x0) [ 210.378584][ T25] audit: type=1326 audit(1619675877.261:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16040 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:57 executing program 3: syz_io_uring_setup(0x153d, &(0x7f0000000100)={0x0, 0xb648}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), 0x0) [ 210.470965][T16105] loop4: detected capacity change from 0 to 4096 [ 210.485554][ T25] audit: type=1326 audit(1619675877.371:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16107 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, 0x0) [ 210.514953][T16105] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 210.535506][T16113] loop1: detected capacity change from 0 to 264192 [ 210.535801][T16112] loop2: detected capacity change from 0 to 264192 05:57:57 executing program 3: pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_nanosleep(0x7, 0x1, &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) 05:57:57 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffffffffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 210.642326][T16134] loop4: detected capacity change from 0 to 4096 [ 210.684512][T16144] loop2: detected capacity change from 0 to 264192 05:57:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xb0010000000000, 0x0, 0x0, 0x0, 0x0) 05:57:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0, 0xfffffffffffffd8a}}, 0x0) 05:57:58 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, 0x0) 05:57:58 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="2d935cd55601583b25a12644876ef1a5bf5e52b1491fa9adf95c49c2be5cbe59fa6be56f1bdc00f32b311223dd73b1384d66fb3aa3341fee446e539850f6d914d2ddbac44fe72e03090d3b8cdb953d631e16d82b0c95a1b4db48ba64ddf2aa1c6c992ee2e450fb41fa97ddc1d90e6a4773790bc1abe9df3a821b3bdc97905760739d90d2c9c1add8cc0dd6fd8bcfc0e9da315401a69f27beefe919b97a197e6267ae0bd1d387317503051b930aceb92dbafcf2b98ae8c54a7f6e47f05a35540b82e5cda7", @ANYRES32]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = dup2(r0, 0xffffffffffffffff) r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ff) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x3, 0x200, 0x80, 0x7ff}) renameat(r1, &(0x7f0000000080)='./file1\x00', r3, &(0x7f00000000c0)='./file1\x00') r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffa) r6 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x402, 0x0) sendfile(r1, r6, 0x0, 0x8400fffffffa) [ 211.307110][ T25] audit: type=1326 audit(1619675878.191:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16107 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x6b, 0x25]}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 211.401998][T16170] loop4: detected capacity change from 0 to 4096 [ 211.408521][T16171] loop2: detected capacity change from 0 to 264192 [ 211.416666][T16172] loop1: detected capacity change from 0 to 264192 [ 211.428907][ T25] audit: type=1326 audit(1619675878.311:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16167 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:58 executing program 3: clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, 0x0) 05:57:58 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f", 0xf, 0xffc}], 0x0, 0x0) [ 211.439340][T16172] FAT-fs (loop1): Unrecognized mount option "-“\ÕVX;%¡&D‡nñ¥¿^R±I©­ù\I¾\¾YúkåoÜ" or missing value [ 211.477964][T16186] tmpfs: Bad value for 'mpol' 05:57:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 211.591543][T16200] loop2: detected capacity change from 0 to 264192 [ 211.594345][T16199] loop4: detected capacity change from 0 to 4096 [ 212.232126][T16189] loop1: detected capacity change from 0 to 264192 [ 212.239035][T16189] FAT-fs (loop1): Unrecognized mount option "-“\ÕVX;%¡&D‡nñ¥¿^R±I©­ù\I¾\¾YúkåoÜ" or missing value [ 212.255028][ T25] audit: type=1326 audit(1619675879.141:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16167 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:57:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0) 05:57:59 executing program 3: syz_io_uring_setup(0x378b, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x153d, &(0x7f0000000100)={0x0, 0xb648}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 05:57:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:59 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:59 executing program 4: r0 = syz_io_uring_setup(0x378b, &(0x7f0000000000)={0x0, 0xd0c2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080), 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10163, 0x1}, 0x0) syz_io_uring_setup(0x153d, &(0x7f0000000100)={0x0, 0xb648, 0x8, 0x1, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) [ 212.328236][ T25] audit: type=1326 audit(1619675879.211:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16224 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 212.358483][T16232] loop2: detected capacity change from 0 to 7680 05:57:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:59 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x40, 0x0) fstat(r3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r4) setresuid(0x0, r4, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x0, 0xd9c, 0x800) read(r5, &(0x7f00000016c0)=""/4096, 0x1000) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file1\x00', 0xc51b, 0x4, &(0x7f0000000480)=[{&(0x7f0000000240)="fa971066e18b311f97d7160060ac9476b16b10549f746af986857ef25f0c399968e8b99bb0927dafa3f96f4cc601bc093e20d19ebf61091187b9c92e5744c98da357714ae64efd40eecaa8a020dd98d627531f54773fa2ce34b0cefc9f98538a4981fb3b12b61d75abfb195d", 0x6c, 0x3}, {&(0x7f00000006c0)="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", 0x1000, 0x1000}, {&(0x7f00000002c0)="66bc7c8465103c2fc6781b4c90ff97850445310645c0d8f28dae2f38ca0e34f7f9e00197459bf769b898ea6f70d61a34aae28886e07c95bc3ce8972890fc2e7eae6dca2ccf57b0945952352608034cfd6595e4a1ce2a8ac194846c11e1c2c2368469c5e4621908b2136bbe750b1baeb42f5199ed49c7b5f5c9611056a7906e8f7da1ff7c96a99c21e28c1445ade1b9927f0d7cd6448b0b627bc78fee30f52ca84a8a5ff8954872d4020bb1043e4d425050c893739acfdd710b7434", 0xbb, 0xa4}, {&(0x7f0000000400)="07a2a292e6886c52a66278f85fc7fef3a02eb13324df74ad4d5eb52e13072a03cfd749adbd79cc5d40b9c9c0a089b650e458762f76c5ebfcfab2f10632b2c1a2aa34c196c8fdd58edcbeade4e1566eb301c2bc03cde98f77832c54a1e4a5298013b4fce47e9445614230ee7b24b8527141234e213dd0a5", 0x77, 0x3}], 0x2020006, &(0x7f00000026c0)={[{@dots}, {}, {@fat=@codepage={'codepage', 0x3d, '932'}}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@nodots}, {@fat=@fmask={'fmask', 0x3d, 0xffff}}, {@dots}], [{@seclabel}, {@fowner_eq}]}) dup2(r0, 0xffffffffffffffff) r6 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r6, 0x0, 0x8400fffffffa) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r7, 0x0, 0x8400fffffffa) 05:57:59 executing program 3: r0 = syz_io_uring_setup(0x378b, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x4, 0x2010, r0, 0x0) 05:57:59 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:57:59 executing program 4: syz_io_uring_setup(0x378b, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) syz_io_uring_setup(0x153d, &(0x7f0000000100)={0x0, 0xb648}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) [ 212.447138][T16247] tmpfs: Bad value for 'mpol' 05:57:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:57:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x2c}}, 0x0) [ 212.477483][T16255] loop1: detected capacity change from 0 to 264192 [ 212.526174][T16270] tmpfs: Unknown parameter 'obj_role' [ 212.532842][T16273] loop2: detected capacity change from 0 to 7680 [ 212.573705][T16273] isofs_fill_super: root inode is not a directory. Corrupted media? 05:58:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000240)=@proc={0x10, 0x0, 0x0, 0x40}, 0xc) 05:58:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) 05:58:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{}, {0x2, 0x0, 0x0, 0x10001}]}) 05:58:00 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:00 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x10, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) syz_open_dev$vcsu(&(0x7f0000000080), 0x80, 0x80) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:58:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) connect$netlink(r0, &(0x7f0000000240)=@proc, 0xc) 05:58:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000140)={&(0x7f0000000180), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0xb}, @val={0xc}}}}, 0x28}}, 0x0) [ 213.241120][T16299] loop1: detected capacity change from 0 to 264192 [ 213.255592][T16299] FAT-fs (loop1): bogus number of reserved sectors [ 213.258984][T16305] tmpfs: Unknown parameter 'obj_role' [ 213.262346][T16299] FAT-fs (loop1): Can't find a valid FAT filesystem [ 213.277204][T16303] loop2: detected capacity change from 0 to 7680 05:58:00 executing program 3: unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 05:58:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x63, 0x30, 0x5, 0x30, 0x5b, 0x32], 0x2d, [0x7, 0x38, 0x32, 0x31], 0x2d, [0xc, 0x37, 0x66, 0x39], 0x2d, [0x35, 0x34, 0x34, 0x38], 0x2d, [0x66, 0x39, 0x39, 0x33, 0x35, 0x34, 0x37, 0x37]}}}]}) [ 213.298847][T16303] isofs_fill_super: root inode is not a directory. Corrupted media? [ 213.331915][T16317] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 213.340078][T16317] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:58:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xb, 0x0, 0x0) 05:58:00 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 213.354124][T16325] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 213.362400][T16325] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 213.379650][T16327] tmpfs: Unknown parameter 'obj_role' [ 213.460686][T16335] loop2: detected capacity change from 0 to 7680 [ 213.480715][T16335] isofs_fill_super: root inode is not a directory. Corrupted media? [ 214.070934][T16326] loop1: detected capacity change from 0 to 264192 [ 214.080316][T16326] FAT-fs (loop1): Unrecognized mount option "/dev/vcsu#" or missing value 05:58:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@audit}]}) 05:58:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_COOKIE={0xc}]}, 0x2c}}, 0x0) 05:58:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$NL80211_CMD_TDLS_OPER(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 05:58:01 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 214.111792][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 214.111806][ T25] audit: type=1326 audit(1619675881.001:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16304 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 214.217630][ T25] audit: type=1326 audit(1619675881.101:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16355 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 214.226913][T16363] tmpfs: Bad value for 'mpol' [ 214.250148][T16358] loop2: detected capacity change from 0 to 7680 [ 214.272301][T16358] isofs_fill_super: root inode is not a directory. Corrupted media? 05:58:01 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open$dir(&(0x7f00000001c0)='./bus\x00', 0xa0000, 0x3) fsconfig$FSCONFIG_SET_PATH(r3, 0x3, &(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./bus\x00', r4) r5 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r5, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r5, 0xc038943b, &(0x7f0000000280)={0x5, 0x18, '\x00', 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0]}) r6 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x8400fffffffa) 05:58:01 executing program 3: syz_io_uring_setup(0x378b, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) syz_io_uring_setup(0x153d, &(0x7f0000000100), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 05:58:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}]}) 05:58:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f00000001c0)={'syztnl0\x00', 0x0}) 05:58:01 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:01 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x1000002, 0x0) [ 214.392007][T16377] loop2: detected capacity change from 0 to 7680 [ 214.408036][T16377] isofs_fill_super: root inode is not a directory. Corrupted media? [ 214.413675][T16384] tmpfs: Bad value for 'mpol' 05:58:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@mpol={'mpol', 0x3d, {'interleave'}}}]}) [ 214.438281][T16385] loop1: detected capacity change from 0 to 264192 [ 214.492777][T16401] tmpfs: Bad value for 'mpol' [ 215.040509][ T25] audit: type=1326 audit(1619675881.931:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16355 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) connect$netlink(r0, &(0x7f0000000240)=@proc={0x10, 0x0, 0x0, 0x40}, 0xc) 05:58:01 executing program 4: unlinkat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) 05:58:01 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000200)=0x12, 0x4) 05:58:01 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f0000000180)=ANY=[@ANYRESHEX]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) open(&(0x7f0000000140)='./bus\x00', 0x420002, 0x20) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:58:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x8, 0x0, 0x0) 05:58:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[], 0x100}}, 0x0) [ 215.138820][ T25] audit: type=1326 audit(1619675882.021:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16416 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 215.140221][T16421] loop2: detected capacity change from 0 to 7680 [ 215.173507][T16421] isofs_fill_super: root inode is not a directory. Corrupted media? 05:58:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 05:58:02 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:02 executing program 3: faccessat(0xffffffffffffffff, 0x0, 0x1a9) [ 215.202951][T16426] loop1: detected capacity change from 0 to 264192 [ 215.222508][T16426] FAT-fs (loop1): Unrecognized mount option "0xffffffffffffffff" or missing value 05:58:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040), 0x4) [ 215.308178][T16450] loop2: detected capacity change from 0 to 7680 [ 215.341900][T16450] isofs_fill_super: root inode is not a directory. Corrupted media? 05:58:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:02 executing program 4: mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x26b69fc4d55fa73d, 0xffffffffffffffff, 0x10000000) 05:58:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000140)={&(0x7f0000000180), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x70bd25, 0x0, {{}, {@val={0xb}, @val={0xc, 0x99, {0x8}}}}}, 0x28}}, 0x0) 05:58:02 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x10000, 0x0) 05:58:02 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 215.960739][ T25] audit: type=1326 audit(1619675882.851:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16416 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 215.987491][T16426] loop1: detected capacity change from 0 to 264192 [ 215.995027][T16426] FAT-fs (loop1): Unrecognized mount option "0xffffffffffffffff" or missing value [ 216.071981][ T25] audit: type=1326 audit(1619675882.961:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16471 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 216.100739][T16477] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 216.115521][T16475] loop2: detected capacity change from 0 to 7680 05:58:03 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') mkdirat(r0, &(0x7f0000000140)='./bus\x00', 0xc3) r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) preadv(r3, &(0x7f0000000180)=[{&(0x7f0000000240)=""/157, 0x9d}, {&(0x7f0000000400)=""/209, 0xd1}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/231, 0xe7}], 0x4, 0x8, 0x1) dup2(r0, 0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) 05:58:03 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:03 executing program 4: socket(0x22, 0x0, 0x40) 05:58:03 executing program 3: clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, 0x0) clock_gettime(0x3, &(0x7f0000000100)) 05:58:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x0, 0x4, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 216.128645][T16475] isofs_fill_super: root inode is not a directory. Corrupted media? [ 216.157279][T16483] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 05:58:03 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000500)={0x2, &(0x7f00000004c0)=[{}, {0x5}]}) [ 216.225962][T16495] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16495 comm=syz-executor.0 [ 216.227015][T16497] loop2: detected capacity change from 0 to 7680 [ 216.239069][T16496] loop1: detected capacity change from 0 to 264192 05:58:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r0) [ 216.286561][T16497] isofs_fill_super: root inode is not a directory. Corrupted media? [ 216.902986][ T25] audit: type=1326 audit(1619675883.791:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16471 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:03 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = dup2(r1, r1) dup2(r0, r3) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) 05:58:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000040)=0x8000, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) 05:58:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000100)={'syztnl2\x00', 0x0}) 05:58:03 executing program 3: socket(0x28, 0x0, 0xe714) 05:58:03 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:03 executing program 4: syz_io_uring_setup(0x1694, &(0x7f00000006c0), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000600), &(0x7f0000000740)) 05:58:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x14, r1, 0x301}, 0x14}}, 0x0) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x42) [ 216.998049][ T25] audit: type=1326 audit(1619675883.881:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16524 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 217.024123][T16533] loop1: detected capacity change from 0 to 264192 [ 217.031658][T16535] loop2: detected capacity change from 0 to 7680 05:58:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 05:58:04 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 217.066385][T16535] isofs_fill_super: root inode is not a directory. Corrupted media? 05:58:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc) 05:58:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)) [ 217.139046][T16562] loop2: detected capacity change from 0 to 7680 [ 217.174070][T16562] isofs_fill_super: root inode is not a directory. Corrupted media? [ 217.827852][ T25] audit: type=1326 audit(1619675884.711:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16524 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:04 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:04 executing program 3: r0 = getpgrp(0x0) capset(&(0x7f0000000040)={0x20071026, r0}, 0x0) 05:58:04 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:58:04 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) 05:58:04 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = dup2(r0, 0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x42, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r6, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) sendfile(r0, r6, 0x0, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$lock(r5, 0x24, &(0x7f0000000140)={0x2, 0x0, 0x200, 0x1}) sendfile(r2, r4, 0x0, 0x8) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffa) fcntl$setown(r3, 0x8, 0xffffffffffffffff) 05:58:04 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) accept4(r0, 0x0, &(0x7f0000000080), 0x0) 05:58:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=@abs, 0x6e) [ 217.928738][ T25] audit: type=1326 audit(1619675884.811:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16589 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 217.930525][T16599] capability: warning: `syz-executor.3' uses deprecated v2 capabilities in a way that may be insecure [ 217.965850][T16600] loop1: detected capacity change from 0 to 264192 [ 217.965884][T16597] loop2: detected capacity change from 0 to 7680 05:58:04 executing program 0: getresuid(&(0x7f0000002080), 0x0, 0x0) 05:58:04 executing program 4: getegid() r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$char_usb(r0, &(0x7f0000000280)="f4", 0x1) 05:58:04 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) truncate(&(0x7f0000000140)='./file1\x00', 0x101) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:58:04 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff}) write$cgroup_subtree(r0, 0x0, 0x0) [ 218.034694][T16597] isofs_fill_super: root inode is not a directory. Corrupted media? [ 218.111287][T16621] loop1: detected capacity change from 0 to 264192 05:58:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:05 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 05:58:05 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x636801, 0x0) 05:58:05 executing program 4: openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) 05:58:05 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:05 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) ioctl$BTRFS_IOC_SNAP_CREATE(r2, 0x50009401, &(0x7f00000006c0)={{r1}, "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"}) r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r3, 0x1000) lseek(r3, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) 05:58:05 executing program 0: getrlimit(0x8, &(0x7f0000000000)) 05:58:05 executing program 3: r0 = epoll_create1(0x0) pipe2$9p(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)) 05:58:05 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) [ 218.854950][T16652] loop1: detected capacity change from 0 to 264192 [ 218.861935][T16656] loop2: detected capacity change from 0 to 7680 [ 218.888483][T16656] isofs_fill_super: root inode is not a directory. Corrupted media? 05:58:05 executing program 0: getresuid(&(0x7f0000002080), &(0x7f00000020c0), 0x0) 05:58:05 executing program 4: getcwd(&(0x7f0000000000)=""/210, 0xd2) 05:58:05 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 219.034411][T16682] loop2: detected capacity change from 0 to 7680 [ 219.058748][T16682] isofs_fill_super: root inode is not a directory. Corrupted media? 05:58:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x900000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:06 executing program 3: epoll_create1(0xc6993115f246a41e) 05:58:06 executing program 0: stat(&(0x7f0000004180)='\x00', 0x0) 05:58:06 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:58:06 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x13, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:06 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 219.676414][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 219.676427][ T25] audit: type=1326 audit(1619675886.561:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16647 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:06 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$char_usb(r0, 0x0, 0x0) 05:58:06 executing program 4: rt_sigtimedwait(&(0x7f00000020c0), 0x0, &(0x7f0000002180)={0x0, 0x989680}, 0x8) [ 219.769778][T16710] loop1: detected capacity change from 0 to 264192 [ 219.789899][ T25] audit: type=1326 audit(1619675886.681:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16706 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 219.799640][T16715] loop2: detected capacity change from 0 to 7680 05:58:06 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080), 0x2, 0x0) 05:58:06 executing program 3: r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, 0x0) 05:58:06 executing program 0: r0 = epoll_create1(0x0) pipe2$9p(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, 0x0) 05:58:06 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x15) [ 219.889553][T16715] isofs_fill_super: root inode is not a directory. Corrupted media? 05:58:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xa00000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:07 executing program 3: r0 = getpid() tkill(r0, 0x20) 05:58:07 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x14, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:07 executing program 0: r0 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 05:58:07 executing program 4: pipe(0x0) pipe(&(0x7f0000000080)) 05:58:07 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') chdir(&(0x7f0000000140)='./bus\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x60202, 0x0) sendfile(r0, r3, 0x0, 0x4) dup2(r0, 0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./bus\x00', 0x103403, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) [ 220.608909][ T25] audit: type=1326 audit(1619675887.491:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16706 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:07 executing program 0: uname(&(0x7f0000000040)=""/178) 05:58:07 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x200802, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 05:58:07 executing program 4: socketpair(0x2, 0xa, 0x3, 0x0) [ 220.708200][T16767] loop1: detected capacity change from 0 to 264192 [ 220.723706][ T25] audit: type=1326 audit(1619675887.611:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16765 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 220.747373][T16771] loop2: detected capacity change from 0 to 7680 05:58:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, 0x0) 05:58:07 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/udp\x00') [ 220.775002][T16771] isofs_fill_super: root inode is not a directory. Corrupted media? 05:58:07 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x15, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 220.886615][T16797] loop2: detected capacity change from 0 to 7680 [ 220.896699][T16797] isofs_fill_super: root inode is not a directory. Corrupted media? 05:58:08 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)) 05:58:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xb00000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:08 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001600)={&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001380)=[@hoplimit={{0x14}}], 0x18}, 0x0) 05:58:08 executing program 3: add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="f1", 0x1, 0xfffffffffffffffd) 05:58:08 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x16, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:08 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0408050700000000000000000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 221.539797][ T25] audit: type=1326 audit(1619675888.431:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16765 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, 0x0) 05:58:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002f40)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x5}}], 0x18}}], 0x1, 0x0) 05:58:08 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@empty, @private0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x658}) [ 221.641477][ T25] audit: type=1326 audit(1619675888.531:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16815 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 221.665786][T16816] loop1: detected capacity change from 0 to 264192 [ 221.679431][T16822] loop2: detected capacity change from 0 to 7680 [ 221.698666][T16822] isofs_fill_super: root inode is not a directory. Corrupted media? 05:58:08 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x17, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:08 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3a, 0x0, 0x0) 05:58:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f0000000000)=""/4096, &(0x7f0000001000)=0x1000) 05:58:08 executing program 3: socketpair(0x0, 0x100b, 0x0, 0x0) [ 221.825703][T16845] loop2: detected capacity change from 0 to 7680 [ 221.878588][T16845] isofs_fill_super: root inode is not a directory. Corrupted media? [ 222.470280][ T25] audit: type=1326 audit(1619675889.361:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16815 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:09 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x0, 0x5}, 0x20) 05:58:09 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000300), 0x0, 0x40880) read$usbmon(r0, 0x0, 0x0) 05:58:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), 0xffffffffffffffb5}, 0x0) 05:58:09 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x8f, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:09 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000140)='./file1\x00', 0x47) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 222.567267][ T25] audit: type=1326 audit(1619675889.451:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16874 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 222.568894][T16877] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 222.602227][T16878] loop2: detected capacity change from 0 to 7680 05:58:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x400}, 0x1c) 05:58:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x800) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 05:58:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x80) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000000)="d7", 0x1) [ 222.614171][T16879] loop1: detected capacity change from 0 to 264192 05:58:09 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0xffff, 0x5, 0x9, 0x9}) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:58:09 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={0x0}}, 0x0) 05:58:09 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0xac, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 222.661928][T16878] isofs_fill_super: root inode is not a directory. Corrupted media? [ 222.725182][T16900] loop1: detected capacity change from 0 to 264192 [ 222.772937][T16910] loop2: detected capacity change from 0 to 7680 [ 222.784589][T16910] isofs_fill_super: root inode is not a directory. Corrupted media? 05:58:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xd00000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:10 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000040)) 05:58:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000040)="7f", 0x1) 05:58:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x32, 0x0, 0x40) 05:58:10 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0xb0, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:10 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r5, &(0x7f00000001c0)=[{&(0x7f0000000240)=""/187, 0xbb}, {&(0x7f0000000300)=""/122, 0x7a}, {&(0x7f0000000400)=""/201, 0xc9}], 0x3, 0xfff, 0x3) creat(&(0x7f0000000140)='./file0\x00', 0x44) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 223.400071][ T25] audit: type=1326 audit(1619675890.291:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16874 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:10 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/keycreate\x00') write$P9_RLERRORu(r0, 0x0, 0x0) 05:58:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000080)={0xa, 0x4e23, 0x0, @local}, 0x1c, 0x0}, 0xc080) 05:58:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000080)={0xa, 0x4e23, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@dstopts={{0x18}}, @rthdrdstopts={{0x18}}], 0x30}, 0x0) [ 223.488469][ T25] audit: type=1326 audit(1619675890.371:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16929 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 223.522129][T16936] loop1: detected capacity change from 0 to 264192 [ 223.531139][T16938] loop2: detected capacity change from 0 to 7680 [ 223.551462][T16938] isofs_fill_super: root inode is not a directory. Corrupted media? 05:58:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) 05:58:10 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0xf0, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:10 executing program 4: syz_open_dev$rtc(&(0x7f0000000140), 0x6, 0x0) [ 223.678626][T16964] loop2: detected capacity change from 0 to 7680 [ 223.693740][T16964] isofs_fill_super: root inode is not a directory. Corrupted media? 05:58:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xe00000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:11 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000440)) 05:58:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x3, 0x2, 0x5}, 0x14}}, 0x0) 05:58:11 executing program 4: setpriority(0x2, 0x0, 0x401) 05:58:11 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0xfe, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:11 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) creat(&(0x7f0000000140)='./file1\x00', 0xa) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:58:11 executing program 0: select(0x40, &(0x7f0000000080), 0x0, 0x0, 0x0) 05:58:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "2f9269324484ad46f8df5aacb682a5ed04d9ac20537d3fc8e28d40b7434b2829f71edb2a96f177ce10f76daab875588684196597f4152757fb17fd25448ba4c9", "01230372be6b380523e7e593b5da3b308b18d5b6471723d06cc9f6bd587b964b"}) [ 224.429959][T16990] loop2: detected capacity change from 0 to 7680 [ 224.433279][T16989] loop1: detected capacity change from 0 to 264192 [ 224.444290][T16990] isofs_fill_super: root inode is not a directory. Corrupted media? 05:58:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x1b, &(0x7f00000035c0)="5ad5b0ea4d007c6901037b873e09b19050f83084", 0x14) 05:58:11 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='sched\x00') 05:58:11 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x10e, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:11 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000380)={@empty}) [ 224.600526][T17013] loop2: detected capacity change from 0 to 7680 [ 224.635218][T17013] isofs_fill_super: root inode is not a directory. Corrupted media? 05:58:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x46, 0x0, 0x0) 05:58:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) connect$netlink(r0, &(0x7f0000000040), 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="2c000000010801"], 0x2c}}, 0x0) 05:58:12 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:12 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = dup2(r0, 0xffffffffffffffff) openat(r3, &(0x7f0000000140)='./bus\x00', 0x400000, 0x4) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) [ 225.261974][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 225.261988][ T25] audit: type=1326 audit(1619675892.151:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16988 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:12 executing program 0: select(0x40, &(0x7f0000000000)={0x5}, 0x0, &(0x7f0000000080)={0x7}, &(0x7f00000000c0)={0x0, 0x2710}) 05:58:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2, 0x5}, 0x1c) [ 225.352233][ T25] audit: type=1326 audit(1619675892.241:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17043 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000001500)=[@dontfrag={{0x14, 0x29, 0x3e, 0x8}}], 0x18}, 0x0) 05:58:12 executing program 3: prlimit64(0x0, 0x0, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)) [ 225.400102][T17051] loop1: detected capacity change from 0 to 264192 05:58:12 executing program 0: syz_open_dev$loop(&(0x7f0000003940), 0x0, 0x20480) 05:58:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c, 0x0}, 0x0) 05:58:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000080)=0x1c, 0x4) [ 225.829179][T17048] loop2: detected capacity change from 0 to 7680 [ 225.850261][T17048] ISOFS: Unable to identify CD-ROM format. 05:58:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x1100000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:13 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x430602, 0x0) write$selinux_attr(r0, 0x0, 0x0) 05:58:13 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000012c0)={&(0x7f0000003940)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, &(0x7f0000001240)=[{&(0x7f0000000140)="f9a429", 0x3}, {&(0x7f00000001c0)="207071a2bf898764964b73e3a8f18d9abe07ad17dafaa5eb50dde6c0cd524ea9954e34cb883eb7bb207f030da9dfb637c4a3b92537df584ff67cacb4f48ae64ee07f7e39b23970bd90c099bc82c000dc1e8e8a49a223cad0fa1519d9e3e87dbe132cfcd12be08508f05801", 0x6b}], 0x2}, 0x0) 05:58:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x72, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0xb4, 0x2) truncate(&(0x7f0000000340)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="4c6465762f9ab06c74"], 0x0, 0x0, 0x0, 0x0) unlink(0x0) 05:58:13 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2f800, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:13 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./bus\x00') sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x8) sendfile(r1, r4, 0x0, 0x8400fffffffa) r5 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r5, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) write(r5, &(0x7f0000000240)="d2082ea82c887bdd766bda165241b7e4e620ee3b663b9c341ac4db8850107d533253828c1907c6299016192b73e818a3af6a020004283abd270a026a1d48d9393860cf33393c327bd00efbc2dd60306f27d4eb114008849396c7f49a1c138716d5a87d956b6dd848980b0a2dd829df1a51b4aebd1309b92e160cbec00f0a618cd1863d24f9151ba6344d944bf5da53f76dcace4058b76928b03a4092e16ea22f815a004c8b42cb", 0xa7) [ 226.185296][ T25] audit: type=1326 audit(1619675893.071:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17043 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:13 executing program 3: prctl$PR_SET_MM(0x23, 0xd, &(0x7f0000ffa000/0x4000)=nil) 05:58:13 executing program 0: fork() r0 = getpid() wait4(r0, 0x0, 0x0, 0x0) [ 226.279486][ T25] audit: type=1326 audit(1619675893.171:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17102 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 226.305541][T17105] loop1: detected capacity change from 0 to 264192 05:58:13 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = dup2(r0, 0xffffffffffffffff) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000140)={0xff, 0x6}) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r4, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) sendfile(r4, r0, 0x0, 0x8400fffefffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) 05:58:13 executing program 3: syz_open_procfs(0x0, &(0x7f0000002040)='net/protocols\x00') 05:58:13 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f00000007c0)=@fragment, 0x8) 05:58:13 executing program 3: socket$packet(0x11, 0x42770b91e1c3743, 0x300) [ 226.501168][T17134] loop1: detected capacity change from 0 to 264192 05:58:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1, 0x0) 05:58:14 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000004480), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000200)={0x0, 0x0, {0x0, 0x0, 0x0, 0x2, 0x0, 0x7fff}}) 05:58:14 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x6) [ 227.113426][ T25] audit: type=1326 audit(1619675894.001:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17102 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 227.188310][T17161] loop1: detected capacity change from 0 to 264192 05:58:14 executing program 4: mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/125) 05:58:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x1200000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:14 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffe, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:14 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) 05:58:14 executing program 0: clock_gettime(0x0, &(0x7f0000000140)={0x0}) select(0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180)={r0}) 05:58:14 executing program 3: add_key$fscrypt_v1(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, &(0x7f00000000c0)=ANY=[], 0x29, 0xffffffffffffffff) [ 227.413059][ T25] audit: type=1326 audit(1619675894.301:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17171 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001600)={&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote, 0x2}, 0x1c, 0x0}, 0x4048050) 05:58:14 executing program 3: clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) select(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x100000001}, &(0x7f0000000180)={0x0, r0/1000+10000}) 05:58:14 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000004480), 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 05:58:14 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000040)) 05:58:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@remote, 0x0, 0x1}, 0x20) 05:58:14 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r3, 0x80286722, &(0x7f0000000180)={&(0x7f0000000140), 0x0, 0x2, 0x4}) 05:58:14 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000080)={0xa, 0x4e23, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000002900000037000000006c"], 0x30}, 0x0) [ 227.891988][T17213] loop1: detected capacity change from 0 to 264192 05:58:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x2500000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:15 executing program 3: syz_open_procfs(0x0, &(0x7f0000003340)='net/if_inet6\x00') 05:58:15 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000240)={&(0x7f0000000080)={0xa, 0x4e22, 0x0, @dev, 0x6}, 0x1c, 0x0}, 0x0) 05:58:15 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x400000}], 0x100090, &(0x7f0000000400)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="29349aa491b76889286b4ec0ebf410956a60c658407f7acb587a16a0b2ff908585829792d1d17003e0ee39b7e30e09f3c255571cba1b522e750735bac6610d2c29c340ceb988ea6838893a42d7db17035e3b12e7d29bc950fe491d29ee25f47b97a68b77c21bea1343d002740738340b8568eeb94509800a1bfcb1a9e142e8b7c1d0756f60f0ba6dabbbe7c7a7755775cb002d5a16a8ac4a05e1b33c3c84e82dfe166da18b1a68928ddfde40f79cf06bf20a0473ad4ea1d670329db6a496", @ANYRES16, @ANYRESHEX=0x0, @ANYRES32]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000180)) chdir(&(0x7f0000000000)='./file1\x00') r3 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x1000) lseek(r4, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8400fffffffa) r6 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r7 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x20901) write$binfmt_elf64(r7, &(0x7f00000006c0)={{0x7f, 0x45, 0x4c, 0x46, 0xff, 0x8, 0xf5, 0x8, 0x5a, 0x3, 0x6, 0x85, 0x123, 0x40, 0x1ba, 0x15f, 0x2, 0x38, 0x1, 0x3, 0x7, 0x2}, [{0x70000003, 0x9, 0x232f98b7, 0x55d, 0x1, 0x8000, 0x1, 0x200}], '\\', ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x979) sendfile(r3, r6, 0x0, 0x8400fffffffa) 05:58:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x1}, 0x20) 05:58:15 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffffffffffe, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 228.255840][ T25] audit: type=1326 audit(1619675895.141:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17171 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:15 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) [ 228.340518][ T25] audit: type=1326 audit(1619675895.231:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17233 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000004780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000002cc0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 05:58:15 executing program 0: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) [ 228.386455][T17246] loop1: detected capacity change from 0 to 264192 05:58:15 executing program 4: add_key$fscrypt_v1(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='logon\x00', 0x0) 05:58:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000003140)={&(0x7f0000000100), 0xde, &(0x7f0000003100)={&(0x7f0000003080)={0x14}, 0x14}}, 0x0) 05:58:15 executing program 3: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) fork() syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) 05:58:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, 0x0) 05:58:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_ADD_TX_TS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0xfad2c4bc04471bb9, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) [ 229.172163][ T25] audit: type=1326 audit(1619675896.061:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17233 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 229.236850][T17260] loop1: detected capacity change from 0 to 264192 [ 229.269640][ T25] audit: type=1326 audit(1619675896.161:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17287 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:16 executing program 1: r0 = gettid() rt_sigqueueinfo(r0, 0x27, &(0x7f0000000140)) syz_open_procfs$userns(r0, &(0x7f0000000140)) r1 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r3, 0x1000) lseek(r3, 0x0, 0x2) dup2(r1, 0xffffffffffffffff) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) 05:58:16 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000080)={0xa, 0x4e23, 0x0, @local}, 0x1c, 0x0}, 0x40) 05:58:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 05:58:16 executing program 3: add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000000180)="f1", 0x1, 0xfffffffffffffffd) 05:58:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000012c0)={&(0x7f0000003940)={0xa, 0x4e20, 0x0, @mcast2, 0x7}, 0x1c, &(0x7f0000001240)=[{&(0x7f0000000040)="e0f1581c33f724898cd2322eab7680cf4fe63f73f6198fc2fd124b737a26e147b400d0e2c8de30e85d7f2baa9a1e378c48935e86211edc4cd9ef1b2222b88c9a3f0426c34e2edd159bf67b486434eb78c823ca059ae4141f09cffeb64f0d68092ccd3b4df47e9073105f32e8e4ccc2590012b630a785a0e0d287a226af44b90af186d6fb1458f5", 0x87}, {&(0x7f0000000100)="fc65ed4fc88409ddc115e96c357dd5e0bad02832f034a78d2f119f412c30d40dba9c0ff1b56073cc9dbe0398910a39", 0x2f}, {&(0x7f0000000140)="f9a429e02428860a7d6eb744fe519424c4481e1935534ecfd6788a352fcd13cb840067a076c85a719a27dda4dee2dedc81ae24d2f68c0029728a6b1973554001dd538f996543ae347b1d8ccf188d46b429aac5cb60c468415643b5d5e6afef16d75f3d7868", 0x65}, {&(0x7f00000001c0)="207071a2bf898764964b73e3a8f18d9abe07ad17dafaa5eb50dde6c0cd524ea9954e34cb883eb7bb207f030da9dfb637c4a3b92537df584ff67cacb4f48ae64ee07f7e39b23970bd90c099bc82c000dc1e8e8a49a223cad0fa1519d9e3e87dbe132cfcd12be08508f058017f6e87c2e6904f49720c9dc6f7c1ba5a", 0x7b}, {&(0x7f0000000240)="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", 0x43f}], 0x5}, 0x0) 05:58:16 executing program 0: pipe2$9p(0x0, 0x180000) 05:58:16 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x81) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x40) ftruncate(r2, 0x1000) getgroups(0x7, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xee00, 0x0, 0xee00]) mount$tmpfs(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x200000, &(0x7f0000000280)={[{@huge_always}, {@huge_always}, {@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x37, 0x6d]}}, {@huge_never}, {@mode={'mode', 0x3d, 0xffffffffffffffff}}, {@nr_blocks={'nr_blocks', 0x3d, [0x30, 0x35, 0x25, 0x31]}}, {@gid={'gid', 0x3d, r4}}, {@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x6b, 0x33, 0x15, 0x32, 0x2d, 0x30, 0x30]}}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@fowner_lt={'fowner<', 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x62, 0x65, 0x36, 0x35, 0x63, 0x39], 0x2d, [0x31, 0x66, 0x39, 0x62], 0x2d, [0x37, 0x31, 0x32, 0x64], 0x2d, [0x61, 0x62, 0x35, 0x32], 0x2d, [0x34, 0x37, 0x32, 0x30, 0x37, 0x39, 0x36, 0x62]}}}]}) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) tee(r3, r5, 0x4, 0x2) sendfile(r2, r5, 0x0, 0x8400fffffffa) r6 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x8400fffffffa) 05:58:16 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x1a, 0x0, 0x0) [ 229.487223][T17320] loop1: detected capacity change from 0 to 264192 [ 229.530689][T17320] SELinux: duplicate or incompatible mount options [ 229.899553][T17331] SELinux: duplicate or incompatible mount options 05:58:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x4502000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000080)={0xa, 0x4e23, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit={{0x14}}], 0x18}, 0x0) 05:58:17 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x80) setsockopt$inet6_buf(r0, 0x29, 0x2b, 0x0, 0x0) 05:58:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)=ANY=[@ANYBLOB="c00000001e0231"], 0xc0}}, 0x0) 05:58:17 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0343443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:17 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000180)='./bus/file0\x00', 0x8, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000240)="a2630a125852e9bb2ad2df9f3514fbec3ccbb5b0c44de5c0e8b16324c5f0896495b9e14e2c1b82fdf82294d1d50cfd4bc73d0628644c72eb3f5de9244668456248ad6321439c3043af34edce4d63a0b78a1f4c7122870c2935b1132123080de0c652c668d084b8b1d83a7dc768051bdced14d317df5351aa58c2236e5d1be25739ca729c85c4f9e1f4425cf0a0f863201e167ee170f8e982", 0x98, 0x9}, {&(0x7f0000000300)="6cf6211162a5b9dec853b6341f18871d11bae4d36d05ed0a422ca46d4a6f1e22a6bcd6463f0300efe4b7d1ca09138f5b9226add50621854a93963771a19d927be469da10bb8e1a052395e96c79b58629ad0297eb657d70b5e63e897493ce77cc42367442869959026a750fe6c7ebec51c995abb73da59d6469fb6348845a5ad50cadb456c42cd93512054e697a4fc81270ab84f5868cba1e01c86980827d1680e414", 0xa2, 0xe56}, {&(0x7f0000000400)="3711e7a7b6ca790a5d279bf370e2bb4d76a3527a9f99b6c8160de07aeb97b868853a365c130ad66919e6fde0d3b5379df9d3e6302f34d99460ba6887e859a4ab0dad0ce77be18f05cf1c05cb74ed62b662d9c6503c1baf0e9efa6cf55d509a713c58723534f2b4554541e45bc89595c1e7428a8dd3d570eca914594ff39256f6ef7579a6c64816b00f9ddb", 0x8b, 0x5}, {&(0x7f00000004c0)="a605419bd4f890516ad0deec300088b4fdeb9f7a7dc90601ab95e3a38401bcb4c0b302bbd291fb0d3553178dec92520b7020edd7c5fa534286d4b41b3a461d7433c892e38731f9f6b00afcba8324983918bb6552f0a563d65d428db411cf0dbbc2858fb2447f905b4e966b67486c5a02821297919cf2bebbd4d4aa9221660a55aa890ac0dcd25d47e2c5c54f82f16271908e4555497a16fbcec92c4ebb7d590f9fcc15f55903859be4f50367870da9f61fad6d365c3ee1d2a5a8e4d27eeb14520f5595df03d2a200", 0xc8, 0x1}, {&(0x7f00000001c0)="02915170888dd296ab23a2a77171bd7a49383887fa5b85d9fd", 0x19, 0xfffffffffffff057}], 0x208000, &(0x7f00000006c0)={[{@usrquota}, {@journal_path={'journal_path', 0x3d, './bus'}}, {@errors_remount}], [{@dont_measure}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:58:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f00000000c0), 0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) 05:58:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 05:58:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f00000115c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000000000000001"], 0x50}, 0x0) [ 230.216776][T17354] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=542 sclass=netlink_xfrm_socket pid=17354 comm=syz-executor.4 05:58:17 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)=ANY=[@ANYBLOB="c00000001e0031"], 0xc0}}, 0x0) 05:58:17 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000480)={0x0, 0x0, 'client1\x00', 0x0, "f185f6f07213042e", "4dcea82bedd7d84d28c95b6a466e3be0a007cc0fc5f0764104299fb7b61f3d36"}) [ 230.300596][T17368] loop1: detected capacity change from 0 to 264192 [ 230.330285][T17367] loop2: detected capacity change from 0 to 240 05:58:17 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x80) sendmsg$inet6(r0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[@rthdrdstopts={{0x28, 0x29, 0x37, {0x0, 0x1, '\x00', [@calipso={0x7, 0x8}]}}}], 0x28}, 0x0) [ 230.350536][T17378] netlink: 128 bytes leftover after parsing attributes in process `syz-executor.3'. [ 230.382154][T17367] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x4800000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:17 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000003000), 0x200, 0x0) 05:58:17 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f00000000c0)="71a879db90046527bf1dd212a73d509180cc2741c5201c93b4237a7a82158edd", 0x20) 05:58:17 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0443443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:17 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002f40)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@dontfrag={{0x14}}], 0x18}}], 0x1, 0x0) 05:58:17 executing program 1: syz_btf_id_by_name$bpf_lsm(&(0x7f0000000140)='bpf_lsm_ib_alloc_security\x00') r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r3 = syz_io_uring_complete(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@initdev, @in6=@initdev}}, {{@in6=@ipv4={""/10, ""/2, @dev}}, 0x0, @in6=@initdev}}, &(0x7f0000000180)=0xe8) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) sendmsg$GTP_CMD_GETPDP(r3, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@GTPA_I_TEI={0x8, 0x8, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x4004010) dup2(r0, 0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) [ 231.028028][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 231.028044][ T25] audit: type=1326 audit(1619675897.911:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17347 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f0000000040)="7f", 0x1) 05:58:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0xe}, @val={0x8}, @void}}}, 0x24}}, 0x0) [ 231.131104][ T25] audit: type=1326 audit(1619675898.021:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17410 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 231.162074][T17412] loop2: detected capacity change from 0 to 240 [ 231.169803][T17409] loop1: detected capacity change from 0 to 264192 05:58:18 executing program 4: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x6000) 05:58:18 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[], 0xff67) sendfile(r2, r3, &(0x7f00000000c0), 0xfff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="02"], 0xfe, 0x0) dup3(r2, r3, 0x0) 05:58:18 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0543443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 231.206789][T17412] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:18 executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) [ 231.277047][T17438] loop2: detected capacity change from 0 to 240 [ 231.333252][T17438] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 [ 231.965097][ T25] audit: type=1326 audit(1619675898.851:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17410 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x4c00000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:18 executing program 4: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) 05:58:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000080)={0xa, 0x4e23, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@dstopts={{0x18}}, @flowinfo={{0x14}}], 0x30}, 0x0) 05:58:18 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0643443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') write$P9_RLOPEN(r0, 0x0, 0x0) 05:58:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000bc0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000d00)={0x1c, r1, 0x9, 0x0, 0x0, {{}, {@val={0x8, 0x6}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r1, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x3d}, @void, @val={0xc, 0x99, {0x8000, 0x44}}}}, [@NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x400}]}, 0x30}}, 0x84) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="c4ed6198241bb4b6c77f6e4c9c3d", 0xe, 0x10041}, {&(0x7f0000000340)="5d3af2d233661719419d59de00cd7eaef6bdbe69ecafe429c3b2cd0bb59f42603c91c9ebd19ba3f554e1241bb37d6d5ec877a807b5ac26b5b3171a149524", 0x3e, 0x9}], 0x42010, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r3 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x1000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000016c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r5, 0x50009417, &(0x7f00000006c0)={{r2}, r6, 0xa, @inherit={0x50, &(0x7f0000000140)={0x0, 0x1, 0x9, 0x1, {0x3d, 0x45, 0x1ff, 0x13f4125c, 0x5}, [0x4]}}, @subvolid=0x602}) lseek(r4, 0x0, 0x2) dup2(r2, 0xffffffffffffffff) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffa) r8 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r3, r8, 0x0, 0x8400fffffffa) 05:58:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x2a, &(0x7f00000000c0)="a95d44dd8876634bc5677265c4abcca1c7af7edbc1b99e8e64b9c705aa58483ec122fb70c815446d", 0x28) setsockopt$inet6_buf(r0, 0x29, 0x1b, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) 05:58:19 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000000c0)) [ 232.051995][ T25] audit: type=1326 audit(1619675898.941:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17464 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 232.077251][T17473] loop2: detected capacity change from 0 to 240 [ 232.090313][T17473] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:19 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0743443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:19 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) 05:58:19 executing program 3: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r0 = shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x6000) shmdt(r0) [ 232.110503][T17475] loop1: detected capacity change from 0 to 264192 05:58:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x1, 0x2, 0x3, 0x0, 0x0, {}, [@CTA_EXPECT_ZONE={0x6}]}, 0x1c}}, 0x0) [ 232.222975][T17503] loop2: detected capacity change from 0 to 240 [ 232.237298][T17503] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x6800000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000012c0)={&(0x7f0000003940)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, &(0x7f0000001240)=[{&(0x7f0000000040)="e0f1581c33f724898cd2322eab7680cf4fe63f73f6198fc2fd124b737a26e147b400d0e2c8de30e85d7f2baa9a1e378c48935e86211edc4cd9ef1b2222b88c9a3f0426c34e2edd159bf67b486434eb78c823ca059ae4141f09cffeb64f0d68092ccd3b4df47e9073105f32e8e4ccc2590012b630a785a0e0d287a226af44b90af186d6fb1458f5cc58ae9629acecacc4", 0x90}, {&(0x7f0000000100)="fc65ed4fc88409ddc115e96c357dd5e0bad02832f034a78d2f119f412c30d40dba9c0ff1b56073cc9dbe0398910a39", 0x2f}, {&(0x7f0000000140)="f9a429e02428860a7d6eb744fe519424c4481e1935534ecfd6788a352fcd13cb840067a076c85a719a27dda4dee2dedc81ae24d2f68c0029728a6b1973554001dd538f996543ae347b1d8ccf188d46b429aac5cb60c468415643b5d5e6afef16d75f3d7868", 0x65}, {&(0x7f00000001c0)="207071a2bf898764964b73e3a8f18d9abe07ad17dafaa5eb50dde6c0cd524ea9954e34cb883eb7bb207f030da9dfb637c4a3b92537df584ff67cacb4f48ae64ee07f7e39b23970bd90c099bc82c000dc1e8e8a49a223cad0fa1519d9e3e87dbe132cfcd12be08508f058017f6e87c2e6904f4972", 0x74}, {&(0x7f0000000240)="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", 0x415}], 0x5}, 0x0) 05:58:19 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0843443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x14, 0x1, 0x2, 0x401}, 0x14}}, 0x0) 05:58:19 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_tables_names\x00') [ 232.885315][ T25] audit: type=1326 audit(1619675899.771:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17464 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 232.911888][T17508] loop1: detected capacity change from 0 to 264192 [ 232.981082][T17528] loop2: detected capacity change from 0 to 240 [ 233.003505][ T25] audit: type=1326 audit(1619675899.891:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17530 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 233.035108][T17528] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:20 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={'geneve1\x00', {0x2, 0x0, @broadcast}}) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r4, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x4010, r4, 0x4d5d9000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffa) r6 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x2) 05:58:20 executing program 3: socket$inet6(0xa, 0xd9812c011844e0f9, 0x0) 05:58:20 executing program 0: sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, 0x0, 0x5bbe8c4d9afdd489) 05:58:20 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x0, "c252cf1ed17b894b1fadcc0dd31542dd6722cf7ac9cb6020f1c784226a8bbc698e811aa70970b03361c5ef65f8364cd8f7621ce8078f0c00492c1eab53cea802"}, 0x48, 0xfffffffffffffffc) add_key$keyring(&(0x7f00000001c0), 0x0, 0x0, 0x0, r0) 05:58:20 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0943443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:20 executing program 0: ioperm(0x0, 0x7, 0x0) 05:58:20 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/cgroup\x00') [ 233.145346][T17554] loop2: detected capacity change from 0 to 240 [ 233.157220][T17556] loop1: detected capacity change from 0 to 264192 [ 233.187041][T17554] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x6c00000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x1, 0x0, 0x5}, 0x20) 05:58:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x80) getsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, &(0x7f0000000040)) 05:58:20 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000000)={0x2, 0xffffffff}, 0x0) 05:58:20 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0a43443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/19, 0x13}], 0x1, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x100000003, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f0000000140)=ANY=[@ANYRES16=r0]) chdir(&(0x7f0000000000)='./file1\x00') r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0) lseek(r3, 0x0, 0x2) close(r3) dup2(r1, 0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffa) setfsuid(0x0) setresuid(0x0, 0x0, 0x0) getresuid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f00000002c0)='./file1\x00', 0x8, 0x0, &(0x7f0000000500), 0x240000, &(0x7f0000002800)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@huge_within_size}, {@huge_never}, {@mpol={'mpol', 0x3d, {'default', '=static', @val={0x3a, [0x2f, 0x19, 0x39, 0x39, 0x36]}}}}, {@mode={'mode', 0x3d, 0x80}}, {@mode={'mode', 0x3d, 0x6}}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x30, 0x32, 0x2f, 0x2d, 0x32]}}}}, {@size={'size', 0x3d, [0xf5d58283f45bba9d, 0x35, 0x67, 0x31, 0x36]}}, {}, {@huge_never}]}) r6 = pidfd_getfd(r4, r1, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r6, 0xf502, 0x0) [ 233.816326][ T25] audit: type=1326 audit(1619675900.701:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17530 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:20 executing program 0: select(0x40, &(0x7f0000000000)={0x6}, &(0x7f0000000040)={0x6}, &(0x7f0000000080)={0x1}, &(0x7f00000000c0)={0x77359400}) [ 233.892652][ T25] audit: type=1326 audit(1619675900.781:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17592 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 233.931373][T17599] loop2: detected capacity change from 0 to 240 05:58:20 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0b43443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) 05:58:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) accept4$packet(r0, 0x0, 0x0, 0x0) [ 233.944827][T17599] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 [ 233.945266][T17596] loop1: detected capacity change from 0 to 264192 [ 233.969266][T17596] FAT-fs (loop1): Unrecognized mount option "" or missing value 05:58:20 executing program 3: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)="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", 0xffffffffffffff37) 05:58:20 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[], 0x24}}, 0x0) [ 234.012682][T17612] loop2: detected capacity change from 0 to 240 [ 234.034501][T17612] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 [ 234.724898][ T25] audit: type=1326 audit(1619675901.611:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17592 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x7400000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:21 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0c43443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:21 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/icmp\x00') 05:58:21 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000180)='./file1\x00', 0xa0042, 0xdf72ce8498b056f1) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:58:21 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 05:58:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="2c000000010801"], 0x2c}}, 0x0) 05:58:21 executing program 3: add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 05:58:21 executing program 4: syz_open_dev$rtc(&(0x7f00000001c0), 0x100000000, 0x0) 05:58:21 executing program 0: prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffd000/0x3000)=nil) [ 234.817900][ T25] audit: type=1326 audit(1619675901.701:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17638 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 234.845259][T17648] loop1: detected capacity change from 0 to 264192 [ 234.858025][T17647] loop2: detected capacity change from 0 to 240 05:58:21 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000480)={0x81, 0x0, 'client1\x00', 0x0, "f185f6f07213042e", "4dcea82bedd7d84d28c95b6a466e3be0a007cc0fc5f0764104299fb7b61f3d36"}) 05:58:21 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001600)={&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @private2}, 0x1c, 0x0}, 0x0) [ 234.886336][T17647] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x80) setsockopt$inet6_buf(r0, 0x29, 0x14, &(0x7f00000000c0)="f087dd79f7f4ac88e49ea534c9de0e25f442ab43", 0x14) 05:58:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x7a00000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000005f00)={0x0, 0x0, &(0x7f0000005e40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 05:58:22 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0d43443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:22 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x0, "c252cf1ed17b894b1fadcc0dd31542dd6722cf7ac9cb6020f1c784226a8bbc698e811aa70970b03361c5ef65f8364cd8f7621ce8078f0c00492c1eab53cea802"}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000001c0)='\xf7.w\x9b\xec\xfa\xa0\xe3\x83\x89\xcd\"\xdbkZ!\x95Ac\xc3\xd7\xb0\x1d$\xfa-\x18n\xa0.C\xb0\xbb\xe6B\xdf\xa8r\x95.\f\x1ck\xa2\xaa\xb8\x10\xe5\x8d\xee\v?\x14_*mUF\xd0m\x8a\x89\xf0\xe5P\xfa\xf5+\xec\xf6\xaa\x00\x95:\x02\xd7\xe8AGb!\xff\x97\x8bD`\xcc\xb9\b\xef\x02\x06\x11\xea\xeai\x1b\xac|Vwv\x83\xf3\x89,\x13\xb0\x1a:\x17h\xb57\x99i\x87\xe0\xd1V|\x89\xeb\x1d\xe6}\xc5\n\xc4j\x0e\xe4\x02\xdf\x96\xa1\xe9\xd6@i\xb6\xd5l\n\xc2\x04\xdep\xc6\x11\x19f\xae\xc9]\x8a\x11K\x8f\x10\xd9\xdf\xa7\xe4u\x7f\xb9x\xf5\x86\xea3\xe6\xb9\xc6\x8aNS\xbe!\x92c\x8e\xff(\x8c\xab\x02\x83\x85\x1f\x19@G4)\x86>\xe1\xef\x13g\x9fc\xe6\xbf\x84>Y\xd7\xde\xd5\xff\x87\xab\x88\xeb\xe0\xc7\x15N=\xd4\xdaE\t\f0\xde\xc8&\xf2\xd3>m\x0f\xa1:\x87\xe5B\xa7b\xc8\x88\x16\x98\xfe\v0\xe5\x9f/\x87c\xa1\xde\xa8\x8fuf~h\xb5\xc5F\x1e\x80W\xf6\xe5\xd7\xe0\xd7\x00\xf0\a\xb2\xd9\x1b\x0e\xa9eG\x05\xb2\xfd\xc4\xcd\x8e\x0e\xfe_\xc0\xd4\x00'/309, r0) 05:58:22 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 05:58:22 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x400, 0x94) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x9, 0x64, 0xe1, 0x0, 0xf8d, 0x11054, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x6, 0x100}, 0x10430, 0x0, 0x307, 0x5, 0x1ff, 0x100, 0x400, 0x0, 0x0, 0x0, 0x2c8}, 0xffffffffffffffff, 0xc, r5, 0x1) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:58:22 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000002640)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) [ 235.728055][T17697] loop1: detected capacity change from 0 to 264192 [ 235.749945][T17698] loop2: detected capacity change from 0 to 240 05:58:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001a00000007"], 0x28}}, 0x0) 05:58:22 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0e43443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 235.789102][T17698] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000080)={0xa, 0x4e23, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@dstopts={{0x18}}, @rthdrdstopts={{0x18}}, @flowinfo={{0x14}}], 0x48}, 0x0) 05:58:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000040)=0x6, 0x4) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c000000010801"], 0x2c}}, 0x0) 05:58:22 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000080)={0xa, 0x4e23, 0x0, @local}, 0x1c, 0x0}, 0x0) [ 235.837715][T17715] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 235.874179][T17721] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 235.946143][T17725] loop2: detected capacity change from 0 to 240 [ 235.983745][T17725] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xa1cb120000000000, 0x0, 0x0, 0x0, 0x0) 05:58:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_MPATH(r0, &(0x7f00000001c0)={&(0x7f0000000340), 0xb, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 05:58:23 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x430602, 0x0) write$selinux_attr(r0, &(0x7f0000000040)='system_u:object_r:systemd_tmpfiles_exec_t:s0\x00', 0x2d) 05:58:23 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "c252cf1ed17b894b1fadcc0dd31542dd6722cf7ac9cb6020f1c784226a8bbc698e811aa70970b03361c5ef65f8364cd8f7621ce8078f0c00492c1eab53cea802"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) 05:58:23 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0f43443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:23 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r5, &(0x7f0000000140)=0xef9d, 0x100) [ 236.562609][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 236.562621][ T25] audit: type=1326 audit(1619675903.451:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17695 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:23 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x80) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f0000001200)) 05:58:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') [ 236.648293][ T25] audit: type=1326 audit(1619675903.531:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17755 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 236.673190][T17764] loop1: detected capacity change from 0 to 264192 [ 236.683304][T17762] loop2: detected capacity change from 0 to 240 05:58:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="2c000000010801080000000004800900010073797a"], 0x2c}}, 0x0) 05:58:23 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="1043443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 236.704071][T17762] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f00000000c0), 0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@fragment, 0x8) 05:58:23 executing program 4: add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "d5ed0b383bc10cb14a4aba5085ad047484fd16496600009cb2779656104e4a56c6c0479b0d2bb3a39680400494da52ce1e1e74b032aef1fb5837a30b75a8d5a8"}, 0xff14, 0xfffffffffffffffd) [ 236.809478][T17787] loop2: detected capacity change from 0 to 240 [ 236.833102][T17787] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xa1ffffff00000000, 0x0, 0x0, 0x0, 0x0) 05:58:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000012c0)={&(0x7f0000003940)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, &(0x7f0000001240)=[{&(0x7f0000000140)="f9", 0x1}, {&(0x7f00000001c0)=' ', 0x1}], 0x2}, 0x0) 05:58:24 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001600)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @private2}, 0x1c, 0x0}, 0x0) 05:58:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) 05:58:24 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="1143443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:24 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) unlinkat(r0, &(0x7f0000000140)='./file1\x00', 0x0) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) creat(&(0x7f0000000180)='./file1\x00', 0x48) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, r3) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) [ 237.474733][ T25] audit: type=1326 audit(1619675904.361:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17755 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:24 executing program 0: r0 = shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x5000) shmdt(r0) 05:58:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x80) setsockopt$inet6_buf(r0, 0x29, 0x14, 0x0, 0x0) [ 237.568461][T17818] loop2: detected capacity change from 0 to 240 [ 237.575438][ T25] audit: type=1326 audit(1619675904.461:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17815 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 237.600547][T17820] loop1: detected capacity change from 0 to 264192 05:58:24 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x80) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x78) [ 237.638470][T17818] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:24 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/diskstats\x00', 0x0, 0x0) 05:58:24 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="1343443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:24 executing program 0: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x6000) fork() [ 237.808906][T17848] loop2: detected capacity change from 0 to 240 [ 237.827195][T17848] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xba01000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:25 executing program 3: r0 = shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x6000) shmdt(r0) 05:58:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000004780)=[{{&(0x7f0000004980)=@phonet, 0x80, &(0x7f0000000500)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, &(0x7f0000002c00)={0x0, 0x3938700}) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000002cc0)={0x18, 0x0, 0x4, 0x0, 0x25dfdbfb, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 05:58:25 executing program 0: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) 05:58:25 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="1443443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:25 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@dev={0xfe, 0x80, '\x00', 0x44}, @private2, @empty, 0x10000, 0x6, 0x2cc7, 0x400, 0x1, 0x80100102}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000740)={0x388, 0x0, 0x20, 0x70bd2b, 0x0, {}, [{{0x8}, {0x178, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xee}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4d1}}, {0x8}}}]}}, {{0x8}, {0x1ec, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xce0}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x0, 0xff, 0x60, 0x510}, {0x1, 0x2, 0x6, 0x1}, {0x4, 0xff, 0x0, 0x4}, {0x2, 0x7f, 0x5, 0x7}, {0x6, 0xa8, 0x9, 0x8}, {0xff27, 0x7f, 0x81, 0xffff7fff}, {0x4, 0x20, 0x0, 0x2}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}, {0xffffffce, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}]}, 0x388}, 0x1, 0x0, 0x0, 0x80}, 0x4010) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="00dc0000", @ANYRES16, @ANYBLOB="080026bd7000fedbdf250100000008000600", @ANYRES32, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x240000c1}, 0x4000040) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x501001, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r3, &(0x7f0000000440)={&(0x7f0000000300), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="b8000000", @ANYRES16=0x0, @ANYBLOB="010029bd7000fcdbdf2510000000080006000700000008", @ANYRES32, @ANYBLOB="0800030000000000080006000600000008000900000100000800ff00020000005800018008000300010000001400020073797a5f74756e03008f7f000000000008000300010000f70a000000", @ANYRES32, @ANYBLOB="1400020069703665727370616e300000000000001400020065727370616e300000000000000000000800090008000000"], 0xb8}, 0x1, 0x0, 0x0, 0x2000}, 0x20000000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @empty}}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x88, 0x0, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@ETHTOOL_A_COALESCE_RX_MAX_FRAMES={0x8, 0x3, 0xef34}, @ETHTOOL_A_COALESCE_TX_USECS={0x8, 0x6, 0x3}, @ETHTOOL_A_COALESCE_TX_USECS_LOW={0x8, 0x10, 0x5}, @ETHTOOL_A_COALESCE_TX_MAX_FRAMES_LOW={0x8, 0x11, 0x80}, @ETHTOOL_A_COALESCE_RX_USECS={0x8, 0x2, 0x9}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES={0x8, 0x3, 0x8}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x3}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES_IRQ={0x8, 0x5, 0x5}, @ETHTOOL_A_COALESCE_RX_USECS={0x8, 0x2, 0xffffffff}, @ETHTOOL_A_COALESCE_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x50}, 0x20000080) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000008, 0x810, r2, 0xc7e1d000) sendfile(r2, r5, 0x0, 0x8400fffffffa) open$dir(&(0x7f0000000140)='./bus\x00', 0xa1000, 0x8) r6 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x8400fffffffa) [ 238.402843][ T25] audit: type=1326 audit(1619675905.291:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17815 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002b00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000002ac0)={&(0x7f0000000100)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x228, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x98, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '%@/#\'\'{(-(\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '(\xa6\x9e{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x95, 0x4, "9b12dfc46ff468bc18ea0f5d39ca2aaf092b980f46eac15b343229950ab138ea86052fff543dfc6df4b91692fb92c9904224887a282bfe9449c9dd4286a900937c3a96d6d5a7161a1f460b3ef1e6ab5e6d6c13e826e225a479370c07a44cdac97082769b6684950eb429979f2fa8dc8004c67ce4e2c43f893e42295fd29c8329aed54bf682089ba3b82f2e1b5352aa64b9"}, @ETHTOOL_A_BITSET_VALUE={0xad, 0x4, "02a58cce7d68f62f4be4bdb73e6fbc99a68065ecf1022aed872d71ab7e941cc1ef3473841852c33baae3f2f16419a729e2fd8f5a89fca620d69170504c04e7219844eeb401c84e8939d6e402ff532107e5572391907902d6e74a5caa4d995fcbf1a8d4773411716e355d7522969bd9e7b6c613f2239b82dfd53669a72807b163a68fc53bfefaaf61007748c883dc41911fc334831f0b30e61157a3b7d31ce7c72881fdaa1ce2113d5c"}, @ETHTOOL_A_BITSET_BITS={0x38, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.)\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '*\'.!#.%^6-\x00'}]}]}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x110c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x1001, 0x5, "1bc2c7e132504db2f53a4bdc530f34879ea7bbfbf9976606c4f60aff453b9e58fbc7c6d849272d5df365ec78339de81812f1d6434c0ce97efaa04917b8f97ed2762cdb4990a1fa98917e6f05ba5112228fb57e69a9a52d8abf2457de73449e0ea15dd1b7ce05e5f088a7f19fd8b4d3934572f0246d313549c3a5c155d86dd840391e8ee377a30101b616272177e5989d5c44a5821e63759778e4b7fbc78f2e49cb80c0594f5c4ba39e1786b93072e64963bbea3a246514295a850fb2f5929b7fcd35da7d17585350e38ce3769f05c328d4f3affdbb7dc9ece73a04f61f6008f62a7ee4d2a10b70841773f468f178b36d8830ad066e9f4e2441ee319a1a5a9f1caf4eb92086e76aedffc3bc2f5061d90491658ca524b9f94e457275e2b329b74aa1beedc63aea7d126431621ee76c1ec4fd74fed2dfed74072764e8621399217e27c61a6de37cb5c5ffff66c5fc9abebe5bb56f04a8623d7dc14054bbfb3c5aadc548e4ad85fcf8d7ef79ead51ff5f5fe92690ad35c5ad463597ed73c83966c1202020c96a5d31d274bee9349834a1856d456df7e18ea2719547952d2056ad7fdb7046e8780aebeff931f058e8c37e07a4db2a2599d3e114d6ceda1c0901575e59d85c2d09247f6a5a35d5cf6fc523de9182c00cb26eccf886154fa18d4152859c3adda65c4ce6fec876a1ada2d890831fddbe28a6167476f7ec7d4f4e039403649cac1cdc9a3226d2f72d543f2be1273399715e1a2849286d01101185e7ae3770d6304cb2e0e0c99405ccd66f641971c456402c06c9452e6db341394e793981a3ed94e926fcb45dd33927eefc534dc7b7e31ba074607eb375da6d59f730297d9802396a154f61433b80c1ca7cb2fc4f9548043de44eb03bdcefa782f11be4df0c5584254fb8ab8c8c845f70ad96bae7e03d94559a38e5118c895054b42021d8e83b09f6f1f1282b998c47f0c23178d66b2366d182dad387e23eafd78d22b4681d71e6a715e832f99f45d8d797463a8bb588daa3001c890ba4b64b33563d5937707a70f786f27ed859e887672fe6db2859e6930f9c93965e8d13f66e16a5bd2d3b1be3531e7ad0ae68604810567c683a4f23404e532decd7df33f25cad58d3ddfa813152d3af5d47512b388a01e21a2b76abd60bf49f7faf3d44452edc7fe38c19a2937a4ccdc186a5acf9c050c9b01204bece0bd32bdf087cb642d994965508bc9385241efb1f4ebfb1ad625014d07283f0cc9ba5a4e445aa52defd0d0827a65b842477ec8c1fe67ee3018609b2f824a65c42b21416f91df2cb1a80ba4fbe9d5451e4729d6595351172e5b02e600c07843f2b547d25d9044f9ec7f7a487ec452ae97e3f215268528f70ec01d6dc729d8ebe2f2c7cb33e68818cb9a100fe176aabd65244f031ff0dca8dead36807c2c67cde6252863974141fff05a7bdcd56a6a890df1b0a78739f807d6cdf3194ad520865417d370f8fa77d427c4111adcab2029b504972d298470da5035221d1377560ca9de3c19097d36ca0dcb5cb5467b66654422248db9e4825dee1f8076cf2f369d7cb4980b134c96322fc37d3e4cd24bea0cb9a960542b20faa0a71f575bd88922df1af4c58238c4fcfc32349fe4c5158b43d8f7c866e784b67394e511679fbfcaba03b3121ba8d99b02c400f4344ac124b3579aed874cc471aba06e3f8076680700268d30c290b1f7eccece057dda409cda940a3de690495116944baa0c7819d3f27527de18e353226f3ed1dbbbb7ef312d36ed5184fcafce0fd6737cbe5f7a8403bec8de5537b871ae2aef399d0baf176c56443ae550da057efc7e93693b1da0f7261f5ee0055de3054f9f1e5fcbad3ff0c576569f92efd561a13975c29704aed4e5055fbee4cfd48d8699f7b08a7efd1c214e64068f1cbf407fc9c968cb19cf963deb5ef3a1b5c1c4d089db49a3e1f4d2ae9b4616fad29bb3342a43c2f0c47feff2ec882dd11f5f1f6b7dad953b819d380c54ea9af84b77849d5056419c2fd2ec0321eec359bcc908605be449293ae9015ecf902a8603a83807d19bf55595ad05708957dd0e18299f45e9d38f0c40a05941153e24ad8bcbce12cf1c0ca5194d6594ee588240367640e664ce2472305c1a703ee9dc80d2843bd0da005d061db35c4e785de3632960771b7b6e6594a598cb2c942132a64fe6ccb010f0f9164fa2ccb428a1cb2a49c685f945fd58bceab483ea3b45e308fc6ba322bd674838b79031b791aa3d28aabb6f71b11aeb6d5469d323e8244f9a8dae82c4071623185765234484e5a5488e0c1abc5b9e34d25427c147e57397eca98c8fb7e9d3b16929360ca61f93408ecefa5fc44e07efe31a7983861f160c9dac6f9542899124eb472a7c74255e68d1c25842e15297d1a80174f41191dad245b7abe888d62b147fc6b79d9a6ae3dcc1b8326cb5461e6d4140a167afd1dd82fd08b9d1bf9d45ab192f1fbb4e079877e8aa88fe02b1b3e121315d255d5d554007f6a90a25f7cc6de43deb5fce825992b61cd4493cc50f4a1e2bd10af63bffaaa7d5d500e55afbe5ce9ba5bf595d57b1e39d3cb49bb58dca3ab22937d6f20f32147b605ad0a352757190dc29abc85429372b6caa74fd781f3769e4c61e0915a6ecf7ba91e3ed6f7a65f158279b023d5c070c3bd871fda421d330c4bc687f6a367f4e0d09994fc5da51724c4de0a5c579f4cfaedb2ed5499f5fa819fb83fdbe2530632f9b9939109ef392ee5f89e6ddfadc7239f62e39391ba3e9634ccad82ced849002d70cabbb62eb7898b2e06f847c88067b7b716420cef574996638e080ddaf5c6c6697f9080f32c02f945437feafa15c28254f6c33812cb6672b0f38a290c2602e254f59f34f11f31e60464b21affcd0ff09660941f6a8cd3e4a2f5faddf965f54db1ad7bb64e0cc3041934d190ec2d1741aeab8ea08256ff4e6d59881043daf6c4e83b8c233e38718be252f754f688bbb46bf9ec8c5a6ceaa4d6795a5d4fbbc673d84755b7f3cebc5333f7bec78d04c6ed50d5153031ffebd84bcbc34e3abeed9ece862f7bb7076fc79e40a4a948046d4064f96a782c405f636892589ce766073d198961e8256efd9d18c2d3ae7d0ebd3a04db3257ef35d651247ae3578878af4fefd455d5173080ca8d1b07e747c91abbe33abdf8db71239df975407702514963265451589f72c813f85cc210eaba9bc31b49ee8ec29ac44b6b46a449c5b11f16aaee0901ec95733dc506da073521aa31077e62a9b5186e82ff2211e6666a7b988e0911dc1bc606bd9b4133c6f98c8cb0a223845fca48234df1371cf16167ca233b830640337442a43ee6d0f6aaec5ad6f00379ae36541ac751c7b707c461196e03e8c0cac02912e79d0c1285cf0cf05a30293c07aaa0df6bb6e3e25944ea54d542f0836229fc4bd16e1146e1781e7a275a2762c316d99add36cf33c5f10e0a1a4a9a10c1912a12fa2ffdd4ec1fae30ae8cf11b556eb3ab5f8daa2d427de8a7db68ebc2e8a6f4b850114850a3d85c36366fca166318138c474273be6fec3899a440ef9863000036019855dcefb40d4f0c408afe474321027043c44f25172db45556ac53ddc7e180ccd9c9264200f950720a4e8fb33072ca3fdb47c5b250455f1afbb32491513e938c99e769da76de2232bed005f133656c6a4b935f1ebcb042e63042a4778bcd3168817112171733ea1f1a0ebb191ba9f6f397b90fdd1caddeafcc8f386abd783a1f3c13d2a6c4d461bfcea8082b57a41dc5dd97da0bebb45ab207bbdf8a046db4f8a09874de865c3c0370d19105c9194ab92af6318abc7ed36262d65aa10b88658d303e143a4ebcb2660437267b3e8bdee9737a5b14a7d61218f5e2a91f141b16df473c71ba4744d608a08e1c04d892dd042be4969b52b5fb04cc8f35dd6a87eb1a97e72d066449790eadab67b4b36f63ae93e0e2b445cb3a5895b26313b630ce2b431772bc33d457b920990433139e42b537bd20becab03940465023a6f3c14d574ae32f1d8b7af13255b9ac001284cc8d01ea5e7c2bc03158871038a563fb7954c71da439d958835e302ec177125008acaf25bae7c8265a950d1310a7ae8ee7bc0a71c034fec6dee61e3f28fd732c0b29414e0a3911407cffc8d07413f15e61a907115ec39868750cd59c1b99c227aba62fcd89e636508f77867711d48a0bbd799ffbecdc770745c365ec849105165fc744e735e8ab681ac65ed501f69451637bf586001a119820523231ea53cff386ddc33995c6949c1a18f933f0360124744b1562c61eb9dced553c3f424cb7055521e9cbad1e147e53c398be7d08eec66993ac78dcf2628679c759a107d1d761904bd57069e094dbbfc094f381bb37cbee53fd9850f90b00e6990a6cc33bca70188fcb09431b56151f3211ee1cbc00589654e2eeca12897acc81e385677bc6767bbd290632bb678dbdea0a83fc9958a31ce275c577cbd128a854d38cd6511a78ceb2f3d034208a4de1da9942d08a2c16b8a510bb18711733832bcfdec1b7795dc8ad4c56200b83db5ea54f8a13976703902d2741d4a12a206f997631802d8e710f55229fd9097a55a712529e4742193f358beb179e0abd0d17d96e56f0699ab2174103cf91fbce7c5a380e11cbfeb174ec376648182c12c09f8aea9a49b95f4bddaf3156ed728d9d4f503b86d05dd51c82956ffe05fbdac6e4680acf29ab84bdbfdd1df78d74d8749f7faa02b01becee30e778472aa1257ae4604eb1085a4e04c01a388433b3bf0615a328303a3db3a59aa076e81fb754cf13cced89a2c01b73f73a45c5a31fedc3c3523456991dbc8491bec49bb2669fbf36ee830ec700379b58549f9674327c1a68eeb4f723ca1267c019a622fdbf9b7b8037844542e30ef8a3ca8f6f274431489c1a3c087425a2e2b28fbae09ff96417398ed410f125e76fb03f52d239acc774c56cbc86d93ebc662d19d6f2d4c7c0593bc5517b8bca6e146876c9e550af5b2a0ce0a9e26af1c7fc6b1e5252932a5433792fc419bb8e266d2b0bf4f03e4e7c923825f20c7ec3c51cc57dab2e236479c360a53cb017d57434e3d78c95d6a153e58d333d0cb5ce0ce829a5631e01af1d08c6d1a19456701f73bc04211e0dbf4d3f93ed944ef7098ec25fe57cfe92ed909c5b41e27a8ce13318d7747c14062425b892bc7b6a828196850793a322c805a6578b2d033c28607f5cc0672f2e8c57424f8fdbe204b9fedc25ff45fcf09f8f4362a3635b7832ee4a2ae78b22f93e43d4babda225a0f1533b955d86a95981b0bf0dca7f9f93844a9c1e9feb85fdabf77712013412c0aa59d904522604ca9e0ac56fc9a8f982d7f3a78b2920fa0b135f15a223c50821f5b7d116c97921e26667d2de55dcbf6b99e45f80a9a774826e2705b2e8b8b9e7b11291c69a425dc991587edc3bbe678239fd44c471e80d7427adba20e5b34383f22114a9b0ceef1aa093be7bbefb8a3d76408014392d74f509d01b7730d4f36d9307f4fbab225c393a208fecca8e77edf846556c61813c5a71207aefec86d8b2c8520dc5ae3772721fd0fb1a109d7ba516073f5652159b30a7908a35c7352fb358155eb04448be59dfa1c236afde9cea6f0803ac3027da20b44e855915cb9395a5f693e4db5e7332a09312f8779b2bc8711cc722dfa35c4c696f7472500ec628b140df2ddd648748643bb6be008442d9d0e1e52158e1bc890d1a153e5e8e901d5cfa5b6794cf43e7caaedaa5d9b80a5b0504a074d148e85926a7a07ee881d533814cd712005488047bc24e3f31bcd9ab1d9"}, @ETHTOOL_A_BITSET_BITS={0x100, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'bond0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'bond0\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '*\'.!#.%^6-\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '*\'.!#.%^6-\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.)\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '\xfc-()-*\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '*\'.!#.%^6-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '%[:^.*\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_DEBUG_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x228, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xfd, 0x4, "2a0e4c3b62e6e65fa07f5c62483b4dca76a27158d5fc8079fc0065bd6b02ead0c0773e2c5395e2947945857debb93b2480bb2955d5f45b4a090cf4b2aab89a08d7452a9270bfa3853df75ec96ecd00ca04adbe6abbb0fab5768702dfdc9cccf046ef200cdb7eb99772a06d254cc0f79aa8d5bce41ccca5ecefe59a40698d9ab808fd2df14a9d215f3586ad44f9b3647bf411c686f72d3d33d642448842dc6928164c9e0ae64434b19764be88024dd0600da3dc9ed621b2ea4e269a9280e83325e2d5d06fe355a0a8ce2a5575f0f6f9f96c7f15f22aac0d5ef2fdae532ce74fb657e448ada55e685d90ae53823df514f70f43cc4292211e1ba4"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x18, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '$].\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xe9, 0x4, "59d5ea77c94cce7a736ab00d0e528378094497f0bd537380e51b8ff681ce3fb4871fc0b2e593f29e069e25f0b008610694f7f539c43be056772b9a6491db58100b1e4d81ecc8cdd23bbb47b6f95f2cac03de37e4cdabda786b72466da6502770bc95b2b3fae5af3a28dd785f0216126d82e0e01aef5763e05550de41e45cd78ea53658b7e7e284357ed5ab3926db11fb605f00be89932ac7d8138752a201b0498ecda5c0e202ce5b835e8d87b3486bdc0f1b629b33fed377d5c34d79b4fae388b9fe520f5511eb2b67f578711f819f523abe13de039f5fe61a434d7b364b5eab0b24efb29a"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x914, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x8d, 0x5, "88d8e4a45d7b7c34b15f94cf24ce6f7aa061243c16d3c9edbb1413abe58f3134443be6a2d7980adc59500fad8dafe5c0449262675fc5cb55e29c08f38233fd208a0a91735dd11ff19c81b96af58ddef14d321aba7f64362c6c86e46e9dd00abbc4b9555831f35f43fa5fccf3f1bdf51ad1de01e97a6a45331b6cfbe32d52064d5961a2faea06bc16a6"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x25, 0x5, "f5ca31caf718f733d010c0e50f75801cf70b6ead8855f413c47bb39b5ab1bf0650"}, @ETHTOOL_A_BITSET_VALUE={0x6d, 0x4, "37ced72fa0d842c7923e1f1807f3de5decc3a8d6da724df77637c8da957609a23277f12be15b0ebd96204049d7154330b70d4a82b55210c651ab6d34f9b1d8f374a6097e356ee97174ef2e5e055a80829ccff3e82abd0f55cf7a3912c395e63c311a2c1b8c5f12205c"}, @ETHTOOL_A_BITSET_BITS={0x84, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.)\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_VALUE={0x75d, 0x4, "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"}]}]}, 0x1ec4}}, 0x0) 05:58:25 executing program 0: syz_open_dev$loop(&(0x7f0000000000), 0x2, 0x80282) [ 238.505504][ T25] audit: type=1326 audit(1619675905.391:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17878 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 238.530364][T17880] loop1: detected capacity change from 0 to 264192 [ 238.555850][T17883] loop2: detected capacity change from 0 to 240 05:58:25 executing program 3: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="240000001a0007041dfffd946f6105000a0000e8fe020801000108000800100004000000", 0x24}], 0x1}, 0x0) 05:58:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) [ 238.613818][T17883] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:25 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="1543443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:25 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) [ 238.734131][T17907] loop2: detected capacity change from 0 to 240 [ 238.753205][T17907] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 [ 239.336458][ T25] audit: type=1326 audit(1619675906.221:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17878 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xd400000000000000, 0x0, 0x0, 0x0, 0x0) 05:58:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x80) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'sit0\x00', 0x0}) 05:58:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x14, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 05:58:26 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="1643443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:26 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x80) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000001640)={&(0x7f00000005c0), 0xc, &(0x7f0000001600)={0x0}}, 0x0) 05:58:26 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000cc0)='./bus/file0\x00', 0x18) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000140)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r4, &(0x7f0000000c80)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e22, @broadcast}, 0x3, 0x3, 0x3, 0x3}}, 0x80, &(0x7f0000000900)=[{&(0x7f00000002c0)="da25ff829113b85febb12a8a3f2efc9b3270a876625e3ad386ffc3650dbaf6e32d3358f16580fe77c7487889a966b915ff9b8b77d9433a621c80a795add32eb35211f83f0ab5141f1d5b4382ab97c303ef3bbb319962de584b5117cf5da848f84c3d147c00b382139eff5fdb1e92c996feb1029f1058f4d556a63bb497eee056cc0625025bd2b036be3764f06e8f91e1bdb300c4c4bad12729509b46adcee3408c61b0b34b0e1ef88ea10c04cd9dc9263290a703ebfaab34f76e15c1d39dffce4ceb9dfdebbf32eceb58020cd6db15a6c7d3240b3f3126278bc36fe5708198da6779c22b921ec4dcdd", 0xe9}, {&(0x7f0000000400)="ee8958058f9d631da075e72eb986b9ba6fdf0d5797d77f35cc8f11c87ef819197dd70befda261e7c95901daecbffc89e12da180385bdfbc0bd74369e007c7a8d17e3d68006f6ffa27f0585422df12cc93622bc5a12384e41606a7067230a19414e06a01ac67a1534321f88aa097184cced0fa68e6d608d2cac9b0fa23dd5aaef79ae03559f0f536d73860fbec637151d865661d910ecdb1fc743d80f62e67a3245d323227bc1dd4f9c2be4a05d7dcc760a4b9771", 0xb4}, {&(0x7f00000004c0)="49d3e5b84b59f95afab5bc9e4ab3b4612206c0cade9b6d6b2796894953a10a7079edeb694325e2444e5458cc54a1686256ddced54bb223acfb56273102f5fb4271737085b05e80fcb92c809a578510b73386853e94cee08ee57b17c655516705a225fd0cfeee97c6e72b67d894f7ca0a250448c1b8b7939971d702fb2bff831cc11101f1c92aeea419a7f675be2be451b2f02ee98b45b90983b10990ee4cfa26d4be2c80dc7cf6a99269ab62e63e5f74a2928d6038b34d70d88ab4f07b40c5fca647eb7e745b34fbc3", 0xc9}, {&(0x7f00000005c0)="d9ff16d7f08be66e95a2013bb7a96f913189f801b8ed72fed6073ec1be833f6c60759c64b46301a6f58f0a7c2706748675347301e704b04a01fca000770ece4e86adfb5c62abb13e039c71c9b8a2fdb4ea87c83161d588d469defa4989b95f1f4704a4aa80d2e1c1c0ea6097dc3d34af995ac76bbd288d05938217131a8ae708efb6f6c0062b4597af01f9c6aa8810c126b836c30242a47dcd36dae55b82443df9e6f96af19dd032036d03", 0xab}, {&(0x7f00000006c0)="2b36257f95c7f6e53635ac11b99f704deca8c3ff248f5cf238287d8d99d4159b3fd1dd37ed10e4d0b50bc6758b6ef80d0a0e208caf17c749a65a3a6336b019727603f9bebe944132a356de31cd67edaf96a3caa25f41913765994a7423d20e9e14ed3197fad69564c1856e111c8e539a80f09827899a80be73b42bc73407f7e0409a7f98c3", 0x85}, {&(0x7f00000001c0)="d369c9ffa94bca2ea68e4df049a833068d5a5472806dee87b55cbbe73b2808", 0x1f}, {&(0x7f0000000780)="7bd946604267a65254fadb35a4e7e4479aa0f318cfe01a383034e0c471c3abf124a66492dcaf60572b5a381607e90c2e62114f8d1e652159491a7f3f93ebe490f1a85bf37c66265a74db1958cac30c83193ba101", 0x54}, {&(0x7f0000000800)="97df04567358dd061457e6b252adf2517fd88de2eba5c5ba82e7d0bdb4f6987fee9dbf419603cc78e987fd8a530196369757edef2196690f4ad9a60371e90fd4605f8791513dc455a549d2291ddb804a0afbc3c8e3988af35c0d71ca3f3eefabc1a34ebe205393292fc439193d790513d21915e9acc7c34e4dca281ba03f5c2b6f3c924e5d59ac3e50312270c671a34326d8de0d6670517f0c1d177081d57e1e22ce12ecf0f01f8501b6886e4469d8328e5cd2be2bb3ee6c50f67c15fe0ab2f8d8dc4cfb942217e5ba4fd9", 0xcb}], 0x8, &(0x7f0000000980)=[{0x40, 0x3a, 0x390, "228c985036d68b9f5b1f1ab7340d2a0211c79bedb4a7064476e2eb4529e82d62711496791a11e23d0c7b2d539775"}, {0x50, 0x119, 0x2ec1, "9ec6feb87d8e90e1a2ebda9ff99f1433ca4e05fee4d83edea16ea5948047c2486427ea81c434db11575d4f8db1f2633be6dd80b38c5ff32d4dcd"}, {0x60, 0x1, 0x2, "2bc4a206b76f8a908bbec8cfbf9f6dc6113b8d2b976ec1c8de1a138cbca7bd5d0d2ed9b9d6f00a0625cd7d7cce14c2569614ad4a6a4bfbebaa15a6ff0779b367d28938e7a73ce497724f9813"}, {0x100, 0x0, 0x5, "c42e547e2855b8d076da5a7ce27dc6642556a953907574da62130a68988aa291ff65e67b5295cb118183e15993dca9cb1471aa5db4fbdc33a02a79edba3fdf83c6d4478f26a7128980ab6f004e504a708f426c7fe0a699a4c174c3b37b3dcc6f0bbd72b162129b3216542c530ad61334477c491f9af02bc26d634b5a3df039cd4513b6008921612c5f548c023e6038ea8824d31433a6d956cf4675409a026ccc3869e57cb570be001821b50744bec52dd29dcb4a60f5224f3fc59fd8b6f48690fd6d7c30848351a7702b7b08d40c1a352e025ee2e78b7543a447b10fc40f502dddf928bc368dc7a8bb"}, {0xf0, 0x114, 0x7fff, "fba5504bdd85ae0a83f2a2ffad7b0bd98c70b5cf082abd4cdb2dc638834ea81251857c098f17d482f650e0790e037017dec23f037eb44ac4c3f9de244dc23f2891e6fd33f24a52fcd60281aa21d71aae3407fa4b10ac4f6cd862ae96b2c537aeaca9c811eef0d8d881dfa6424d6d206e4cf79021d672ce657415a8bc065195c848ccea0b7707c8625751c001df1170920491acf190efe4ab74c6c46ca132d0b8bd2f8b2f711b28f0f2083f2fff07bf595d8e07b9415a0bbab5134e0945e513cf4de620149c4b71e149d161b280731184ffbc2007bd532fba59df"}], 0x2e0}, 0x40004) sendfile(r2, r3, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) [ 239.425740][ T25] audit: type=1326 audit(1619675906.311:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17929 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 239.434830][T17939] loop2: detected capacity change from 0 to 240 [ 239.460328][T17937] loop1: detected capacity change from 0 to 264192 05:58:26 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) [ 239.472432][T17939] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000012c0)={&(0x7f0000003940)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, &(0x7f0000001240)=[{&(0x7f0000000100)="fc65ed4fc88409ddc115e96c357dd5e0bad02832f034a78d2f119f412c30d40dba9c0ff1b56073cc9dbe", 0x2a}], 0x1}, 0x0) 05:58:26 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="1743443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x28}}, 0x0) 05:58:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000080)={0xa, 0x4e23, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x800}}, @flowinfo={{0x14}}], 0x30}, 0x0) 05:58:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000012c0)={&(0x7f0000003940)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, &(0x7f0000001240)=[{&(0x7f0000000040)="e0f1581c33f724898cd2322eab7680cf4fe63f73f6198fc2fd124b737a26e147b400d0e2c8de30e85d7f2baa9a1e378c48935e86211edc4cd9ef1b2222b88c9a3f0426c34e2edd159bf67b486434eb78c823ca059ae4141f09cffeb64f0d68092ccd3b4df47e9073105f32e8e4ccc2590012b630a785a0e0d287a226af44b90af186d6fb1458f5cc58ae9629acecac", 0x8f}, {&(0x7f0000000100)="fc65ed4fc88409ddc115e96c357dd5e0bad02832f034a78d2f119f412c30d40dba9c0ff1b56073cc9dbe0398910a39", 0x2f}, {&(0x7f0000000140)="f9a429e02428860a7d6eb744fe519424c4481e1935534ecfd6788a352fcd13cb840067a076c85a719a27dda4dee2dedc81ae24d2f68c0029728a6b1973554001dd538f996543ae347b1d8ccf188d46b429aac5cb60c468415643b5d5e6afef16d75f3d7868", 0x65}, {&(0x7f0000000240)="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", 0x48a}], 0x4}, 0x0) [ 239.568845][T17956] loop2: detected capacity change from 0 to 240 [ 239.595809][T17956] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xeaffffff00000000, 0x0, 0x0, 0x0, 0x0) 05:58:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x32, &(0x7f00000035c0)="5ad5b0ea4d007c6901037b873e09b19050f83084", 0x14) 05:58:27 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="8f43443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:27 executing program 0: select(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x13a}, 0x0, &(0x7f0000000140)={0x77359400}) 05:58:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000440)={&(0x7f0000000300), 0xffffffffffffff84, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c000403ffdbc26cc630ec6500", @ANYRESHEX, @ANYRESDEC], 0x2c}}, 0x404c055) 05:58:27 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) sendmsg$sock(r1, &(0x7f00000004c0)={&(0x7f0000000240)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5}, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="a312e7191c70702e569245e5ca6edcbb8fc127dcea31ed8d677c1fa26c6bd2569fe505fceba1fe95e22759a42b3f0b590805140da382a32b94", 0x39}, {&(0x7f0000000300)="ecd09aa40b236532ab3cc66c6f3832d76b7da9248af78c99b4315978cb46af379e716a793a6397819c7fe765f301507b7df5d64887241f0b7bf648256b80fc7540f05647f47e18ddfba00e01b0c22a8352179120f3262575e6f796b2c47b30ab3257431a1f5f03e39dc27ec705a3", 0x6e}], 0x2, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0xa0d5}}, @timestamping={{0x14, 0x1, 0x25, 0xfffff001}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}], 0xa8}, 0x90) chdir(&(0x7f0000000000)='./file1\x00') r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r3, 0x1000) creat(&(0x7f0000000540)='./bus\x00', 0x1ed) lseek(r3, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffa) r6 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) unlinkat(r6, &(0x7f0000000500)='./file1/file0\x00', 0x200) [ 240.259583][ T25] audit: type=1326 audit(1619675907.151:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17929 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000040)) 05:58:27 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x80) sendmsg$inet6(r0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[@rthdrdstopts={{0x18}}], 0x18}, 0x0) [ 240.360805][T17990] loop1: detected capacity change from 0 to 264192 [ 240.368995][ T25] audit: type=1326 audit(1619675907.251:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17988 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 240.394128][T17992] loop2: detected capacity change from 0 to 240 05:58:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f00000115c0)={0x0, 0x0, 0x0, 0xfffffffffffffcc0, &(0x7f00000114c0), 0x40}, 0x0) 05:58:27 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) creat(&(0x7f0000000140)='./bus\x00', 0x100) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:58:27 executing program 0: getgroups(0x1, &(0x7f0000000100)=[0xee01]) 05:58:27 executing program 3: clock_gettime(0x6, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x11, 0xa, 0x5, 0x0) [ 240.440398][T17992] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 [ 240.520367][T18012] loop1: detected capacity change from 0 to 264192 05:58:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0) 05:58:28 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="ac43443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000040, 0x0) 05:58:28 executing program 0: setresuid(0x0, 0xee01, 0xee00) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) 05:58:28 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x2, &(0x7f0000000240)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}, {&(0x7f0000000140)="5d0f07b016a3758d9f7c46324aa68a2fa64c547078952a699bf19447ff5282fc0f99e7cbb8850222e823d909e2927244435b383d64762f51de965e460b4e57bc2279709e25bf2d8595bc59da01cc7937101f08d053840866b0710c981f01f8b8e7f084cf3287efa85748cca647ebc113ec0be0d613b04f0796fad28592cbe8e95ce6843a15afcc96bc2a7f6530785ab572000000000000000000", 0x9a, 0x80000000}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:58:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="2c000000010801"], 0x2c}}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) 05:58:28 executing program 3: syz_open_dev$loop(&(0x7f0000000080), 0xa9, 0x494006) 05:58:28 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/nf_conntrack_expect\x00') [ 241.288886][T18042] loop2: detected capacity change from 0 to 240 [ 241.305829][T18044] loop1: detected capacity change from 0 to 264192 [ 241.308487][T18042] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:28 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000001580)={@remote, 0x0, 0x2}, 0x20) 05:58:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000012c0)={&(0x7f0000003940)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}, 0x0) 05:58:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000004780)=[{{&(0x7f0000004980)=@phonet, 0x80, 0x0}}], 0x1, 0x0, &(0x7f0000002c00)={0x0, 0x3938700}) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000002cc0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 05:58:28 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="b043443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 241.513555][T18073] loop2: detected capacity change from 0 to 240 [ 241.544562][T18073] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:29 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000004480), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)) 05:58:29 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r4, r3, 0x0, 0x8400fffffffa) 05:58:29 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="f043443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:29 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0), 0x8) 05:58:29 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x80) recvmmsg(r0, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12000, 0x0) 05:58:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xffffc900007c9000, 0x0, 0x0, 0x0, 0x0) [ 242.119938][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 242.119952][ T25] audit: type=1326 audit(1619675909.011:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18035 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 242.215497][T18101] loop1: detected capacity change from 0 to 264192 [ 242.222198][T18102] loop2: detected capacity change from 0 to 240 [ 242.222472][ T25] audit: type=1326 audit(1619675909.111:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18100 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01001106040000001e717444cf000700cb"], 0x28}}, 0x0) 05:58:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x30, 0x1, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_HELP_NAME={0xa, 0x6, 'H.245\x00'}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_MASTER={0x4}]}, 0x30}}, 0x0) 05:58:29 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="fe43443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 242.259991][T18102] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:29 executing program 4: socket$inet6(0xa, 0x3, 0x80) select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0xa}, 0x0, 0x0) [ 242.313452][T18118] netlink: 'syz-executor.3': attribute type 203 has an invalid length. [ 242.340232][T18124] loop2: detected capacity change from 0 to 240 05:58:29 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243ee3030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000080)={0xa, 0x4e23, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@dstopts={{0x18}}, @flowinfo={{0x14}}, @rthdr={{0x18}}], 0x48}, 0x0) 05:58:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000012c0)={&(0x7f0000003940)={0xa, 0x4e20, 0x0, @mcast2, 0x7}, 0x1c, &(0x7f0000001240)=[{&(0x7f0000000040)="e0f1581c33f724898cd2322eab7680cf4fe63f73f6198fc2fd124b737a26e147b400d0e2c8de30e85d7f2baa9a1e378c48935e86211edc4cd9ef1b2222b88c9a3f0426c34e2edd159bf67b486434eb78c823ca059ae4141f09cffeb64f0d68092ccd3b4df47e9073105f32e8e4ccc2590012b630a785a0e0d287a226af44b90af186d6fb1458f5cc58ae9629acecacc4", 0x90}, {&(0x7f0000000100)="fc65ed4fc88409ddc115e96c357dd5e0bad02832f034a78d2f119f412c30d40dba9c0ff1b56073cc9dbe0398910a39", 0x2f}, {&(0x7f0000000140)="f9a429e02428860a7d6eb744fe519424c4481e1935534ecfd6788a352fcd13cb840067a076c85a719a27dda4dee2dedc81ae24d2f68c0029728a6b1973554001dd538f996543ae347b1d8ccf188d46b429aac5cb60c468415643b5d5e6afef16d75f3d7868", 0x65}, {0x0}, {&(0x7f0000000240)="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", 0x4b1}], 0x5}, 0x0) [ 242.358855][T18124] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 [ 242.360881][T18127] netlink: 'syz-executor.3': attribute type 203 has an invalid length. [ 242.442180][T18135] loop2: detected capacity change from 0 to 240 [ 242.456950][T18135] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 [ 243.055043][ T25] audit: type=1326 audit(1619675909.941:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18100 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0) 05:58:30 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000001500)) 05:58:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0), 0x4) 05:58:30 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243f03030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:30 executing program 4: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x80282) 05:58:30 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x42) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:58:30 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000b40)={0x13}) 05:58:30 executing program 4: syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) getrlimit(0x0, &(0x7f0000000000)) [ 243.134104][T18161] loop2: detected capacity change from 0 to 240 [ 243.145012][T18161] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 [ 243.154359][ T25] audit: type=1326 audit(1619675910.041:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18155 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:30 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x80) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40200024}) 05:58:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 05:58:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x66, 0x0, &(0x7f0000000080)) [ 243.186260][T18167] loop1: detected capacity change from 0 to 264192 05:58:30 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243442530310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 243.287175][T18193] loop2: detected capacity change from 0 to 240 [ 243.300293][T18193] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0x2, 0x0, 0x0, 0x0) 05:58:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000012c0)={&(0x7f0000003940)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, &(0x7f0000001240)=[{&(0x7f0000000100)="fc65ed4fc88409ddc115e96c357dd5e0bad02832f034a78d2f119f412c30d40dba9c0ff1b56073cc9dbe0398910a39", 0x2f}, {&(0x7f0000000140)="f9a429e02428860a7d6eb744fe519424c4481e1935534ecfd6788a352fcd13cb840067a076c85a719a27dda4dee2dedc81ae24d2f68c0029728a6b1973554001dd538f996543ae347b1d8ccf", 0x4c}, {&(0x7f00000001c0)="207071a2bf898764964b73e3a8f18d9abe07ad17dafaa5eb50dde6c0cd524ea9954e34cb883eb7bb207f030da9dfb637c4a3b92537df584ff67cacb4f48ae64ee07f7e39b23970bd90c099bc82c000dc1e8e8a49a223cad0fa1519d9e3e87dbe132cfcd12be08508f058017f6e87c2e6904f49720c9dc6f7c1ba5a", 0x7b}, {&(0x7f0000000240)="37559ef1a42db76144be6d1b324887539ebfd072d9ce5899b68a3bca2b52585ebd9f3d48952b194e46de3fc54c66304ed421da0fe3426f9197aa9d9c9cab0533c6d0d0a26b07febb4bd3f7d0cdf60a05b629ecb09ce0cedb7ca6a2bf18ec7f020ee687e0774d452acd3804a24e9f5ca486a475fc7e8b062fc6c2a2c0745a97c07749780ace50090563b69f7c93c124c0cd87f6ecaf7cef3965fefc201b5f9232fc1aa154049dee9e1e7fcd5ba0c2b049c5ad86252e2623a572afe0a90bd540d88a2cb793f29f65abd671deb97abf0067040d2f27347f0a94024fed781e19e72d5b1e14abd71da72945e8ad46ef09f4050b364aae6b00f8ee2fb4e505f4f8fbb7ecf6d109176d3c1138aa0ce1c32983630f45bda71d71690556c24fe02b927b70376b822a73eb8588403c2b1b9db3f47e0d0259473a1c0115639fd40b1dfafd59fbc1cd9ef3f1716bf684f96621a688c748af3c051f40e7b98c7306e70475833916556b19e071ee88778b9858208bb81dc1127e18eab143b690c7dd2e8273c7e2af04122c407cdc9b538a0bc0daa9ade68f4ec2033ffd1e1cd1e7b7061c098a7e3168aed4918d5fce15e7ac20f312eb925b6fa40d6e78f22ea0fcd25cf406065e7e41ca13f546b36a599b59a5756b9aa819e1706d69d94e54c2add11c31e28e0de3257da0c9f30891f9999a605cc60b75c71926c2c2b2184c1596c59307bc5b42afa0847f79f33fb0aa4f33e9139dd7b2efb0998a2e4f4c95612e27b896b8b36ab1f0c43ce1cfabdac2e783e99dae537c4c56fa0c73160f50593b5244f5809b713c202e561965fd861d53f7d68b8c82bf408b111610ff8e3763b83f54eacd67bf1ce7a1e033d7a22c77f98e38308cc822f9e7c844e8380aa413b356c4aa78e976bdff5a144303ff8995cf8d2994b2c19b048914f56eaf0e7445f127a86bdfdc73b65ff02d0a3eb969f0c8b884fd260e40a81e184bb45f68db74b8a6c40c7215fa79e34f1b5ab3a2c067a59e21fb50ab8d03f33d489efb767a2dfc5cce000c2c12f292ec3ebe72deb20b612964de56a35b95d9122d1db92c6d90f5b9b6bfeff9088f696e2a5fb05137cce2f16656b70621ef35c6b2a59d99b25f8af93fbe537662dfa6448c2a93fb220640e7a1779620b877e018f8bbeb63ae29b060a20285dbae9b6102d12a1b3f54390682414de986a7a787cf9a5712542c3a0359ebce86446eb6129529834d11c6e26f99037e6d317705d98fbe529cdcf8eec7dabacbacfd008d7b113b306dc14be03fcef4779ef7f77917479430451863286adaaa24920cbd5cd12807e7e01b05f93f57484ff4a62523f265106df2f746ddf6b0bdfa816025961437f9bca2e8e0670d10c750c58fd70cf7fc39cc9d69328845d32094c3335b9215207ec57b97ca0438bd3677aef3bb60b4962b3cdc8faf99c268466e68d5d5c444ada3ba7d8742553c15acc9ab8155773476dca352dff1339e3ee66d5d168562ba48bbf95908f34eb9306eaa58fc90444f14ad6579e8bdcfd85d198405a403def481e2ecc37d5d48c411bc680dfaa3c8c123c584436754eaff9a89fea92c35472c06488e97c2ff7b6eec6c89a639331f509dc378d0e272f509282fbb32d7e268ca15708efd779fdf72b077691e284a56878885513fbe1a863283c37413103418a86d60f92ecb36b720406637a6514c486de8390676187fbd38944216b6b4c20cc4d399e70f1e6f3f6c2fe049c3a3590c5e581f32c746fb93bed1bb3f3a3b4dd6670c403dcc27ff01156e68d3565f38e4a60b8e2ed3efdcbc2ce129155421a91b51e1a169f6467f785247666d7da97ef3dd9062022358fcfafc01211fdfa6fb38c64fd19045134797d1bf3a3718ea1978a003e6b76fd335efaa87307bd66aee22308ed21f442bf41ff93d3c70286139dcf0219f9c18310d52017bd0ab61158a0d37ec8375d57a3336dc65f04005ca1b6a0ddface62749228974adaabfff0918da63ddc75773f2e9b3ddab9fc6dbea4fc380c3d05bf2aca04f3f14b3fd44ccc3ab5859b2a09094f7210974d1adfabab8bce742c4724e5a0639100c0fed7b15085edd966c87173dfaee573b12b0472eb99c9b832536c4080d361a27fa8d46c330d41e9a888df312273b62b2485a3731b5641efb3d8556305069dcc092fadf13bb090daef36f4ad8e81c1374301dbc79459c80614f93603c2375280f41e7cda33f922bd64d04eb04c0090bc351e7afb7b3f235001c6ef9789c8c6bf253fe6a737d2f981fc8624e3ad76eade1ffde6e92cba2b95bcbafaff4c5b68840aba545fd257e8a93dc1c245a864967ae457c2db68dbe84138fd555c7add275c2d24d568a2dd6b3c8d805ee1b97dbbae25803bc8f4d68ee1142414031c2c110f630a56adfc8434563af94d84ff46560fc7dc0f7e89584ce1dddf608e47ef6bb92737bd92f01e4c330d05c354dd575257c96b526af3458fca10f3c698a33041687f644882a9683b10b1123ad63e880e6929018b5911ab85da3ebc84b0e995abe26265b6a6b4a5dd17ef56b518ce770a942f8394c2c5c29f246b46987c99620b0568be7d17e86096f1a495fb2cf7c8fa50858048b26b09dea4b08144be7977edac7038c23fc8d1aff753de996f87ab2fbd3c6a95da358243b274e9c512bf6034fd6f7530017ad1c845ac5c1f52e6c17feeead294ec4f0020eec9600752055824b89ce242328ef530e55a3d4e89d5e7f91aff9eb387003ced99a8048d8230a4263eb5d2f6eaab27ef7c131876c3450bcff4d675806a4bbb864e4ffc7c5e5a1f6e031a8ded682f5cc705193b2703c1b5b5bacd37846f59a0fc36f16f7a557d74a22d03c95bf3f899735c3f9832f533e10b0b64dd22fd7ed1747826704cf4eb22894998fd4e5793c73110f447c5c4230a3cf90d321152327319f96f144c558c5f87db92f734e548b39c05ecdcca782b8ed5bc306d2158a1b218c94500d67c00697b79f969fc8bcfbce3773d8fc277322f93022213abdd860ab163cfb931ae66156728dcda5bd19ac65d22e96987539470a7880f3b3cd45b32e7ed3ee25fe18a494263fd67acd8d561cd95bf18104352a61459d707ddbd61b25532bc49d4d852ac972e5ad645fb69f9beda1fcce82b092b82362caccc13a4d6bdac270e07b32ead8fcabf2ad552c22464c410123214b2f09a526aed595634079e00027e9791e0e901d2efa2a0373cb4dd89c7404123d33912c7bd3f8250da778a9780439b4f2154e07e05bb8b1f71a337af6173f53c4b31324115a87bd7afe0b91ee064c61db39ec35420bad511707ea6270f226919bcdeb74136f562283ad87dbd09b3757da86ce7552078efcac0ecc2d9eb7fd704f40ec2947b74b30e2745872233b240ac1cde120567e8ca60835322a0ca74d2001570b996ac719d119439eac87981e610b5af8600368c432534f2248c832a1f57ba8499d7f4461a17d2b4167e1703c689cb304284829937a69f01a9a91155a96c737259d", 0x9aa}], 0x4}, 0x0) 05:58:30 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x0, 0xd9f, 0xfffffc00) r7 = socket(0x400000000000010, 0x802, 0x0) write(r7, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0xd9f, 0x3) mknodat(r5, &(0x7f0000000140)='./file1\x00', 0x400, 0x3) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:58:30 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x107900, 0x0) 05:58:30 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243442e30310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:30 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0xc800, 0x0) [ 243.952996][ T25] audit: type=1326 audit(1619675910.841:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18155 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001200000010"], 0x2c}}, 0x0) [ 244.034171][ T25] audit: type=1326 audit(1619675910.921:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18208 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 244.041522][T18217] loop1: detected capacity change from 0 to 264192 [ 244.067847][T18218] loop2: detected capacity change from 0 to 240 05:58:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000004f00), 0x4) 05:58:31 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443130310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000001380), r0) [ 244.079634][T18218] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 [ 244.082830][T18225] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 244.106695][T18228] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 05:58:31 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x80) setsockopt$inet6_buf(r0, 0x29, 0x2a, &(0x7f00000001c0)="488762414a8e44b3d0166f96f6edf3374644769507518995e0437835e66bcd6f49c9474048e9152c8666097a7cf302a6d7f347d07ae93a8dfabdb3ef5f27c15f9a34fe8177da13d01f73dadb5ef2d9d3e2e9e4a83d91a1d4eddc422d9ab611f8d2ebb21f7d52bcf31c4fe23cc319ac648b553b1d83bffa9198940af652d7fe094be823558ff7dede", 0x88) 05:58:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@remote, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x20) [ 244.201265][T18240] loop2: detected capacity change from 0 to 240 [ 244.249167][T18240] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0x3, 0x0, 0x0, 0x0) 05:58:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000004780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000002c00)={0x0, 0x3938700}) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000002cc0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 05:58:31 executing program 3: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000340)=0x6015, 0x4) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x808d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(0x0, r0, 0x4, 0xffffffffffffffff, 0x7) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x8000000000006, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0xfffffd2d) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000240)={0xfffffffe, 0x80000001, 0x9, 0x2, 0x14, "f84319f5ad2688443afe2921f2006fc52f611c"}) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x42) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 05:58:31 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "e0c9b862ec28fd31892413e2fd6d2fd4ab3ed628260e157b15da7d342e8a45b84e1205ba4f97b66c17418229d46fe635b21c12f240ea6400791478a5aaa93511"}, 0x48, 0xfffffffffffffffb) 05:58:31 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344fe30310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:31 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000004, 0x40010, r4, 0x627bf000) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) [ 244.855136][ T25] audit: type=1326 audit(1619675911.741:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18208 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:31 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x430602, 0x0) [ 244.937402][T18269] loop2: detected capacity change from 0 to 240 [ 244.943788][T18270] loop1: detected capacity change from 0 to 264192 [ 244.955699][ T25] audit: type=1326 audit(1619675911.841:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18263 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:31 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443025310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 244.985972][T18269] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:31 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x80) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc64100a2}) 05:58:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_TX_TS(r0, &(0x7f0000003a80)={0xffffffffffffffff, 0x0, 0x0}, 0x0) 05:58:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) 05:58:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000600)={0xfffffffffffffeeb, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_REG_RULES={0x0, 0x22, 0x0, 0x1, [{0x0, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME, @NL80211_ATTR_FREQ_RANGE_START, @NL80211_ATTR_FREQ_RANGE_MAX_BW, @NL80211_ATTR_FREQ_RANGE_START, @NL80211_ATTR_FREQ_RANGE_END, @NL80211_ATTR_FREQ_RANGE_MAX_BW, @NL80211_ATTR_FREQ_RANGE_END]}, {0x0, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP]}, {0x0, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN, @NL80211_ATTR_FREQ_RANGE_START]}, {0x0, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START, @NL80211_ATTR_FREQ_RANGE_START]}, {0x0, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME, @NL80211_ATTR_FREQ_RANGE_MAX_BW, @NL80211_ATTR_FREQ_RANGE_MAX_BW, @NL80211_ATTR_FREQ_RANGE_END, @NL80211_ATTR_FREQ_RANGE_END]}, {0x0, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME, @NL80211_ATTR_FREQ_RANGE_MAX_BW, @NL80211_ATTR_DFS_CAC_TIME, @NL80211_ATTR_POWER_RULE_MAX_EIRP]}, {}, {0x0, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME, @NL80211_ATTR_DFS_CAC_TIME, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN, @NL80211_ATTR_DFS_CAC_TIME, @NL80211_ATTR_FREQ_RANGE_END, @NL80211_ATTR_REG_RULE_FLAGS, @NL80211_ATTR_FREQ_RANGE_MAX_BW, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN]}, {0x0, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_MAX_BW, @NL80211_ATTR_FREQ_RANGE_END, @NL80211_ATTR_REG_RULE_FLAGS]}]}]}, 0x28}}, 0x0) [ 245.099815][T18290] loop2: detected capacity change from 0 to 240 [ 245.128549][T18290] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 05:58:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0x4, 0x0, 0x0, 0x0) 05:58:32 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001540)={'syztnl2\x00', 0x0}) 05:58:32 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344302e310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0xfffffffffffffffe}}, 0x0) 05:58:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private=0xa010102}}}, 0x88) r1 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000004c0)="040005090000000066617400027400f80180be2ecbfb54540635e8a3962ec82af57b98eb25d9838425d236e61127d850e906480288a29670ef346162f4c254ac7c33501f642300551f6f88e27a6134bcb5f229ff000000000000", 0x5a, 0xee}], 0x10, &(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB="2ffc42841b4a7d5f43e10fadb820460c4d90f4554ac79c0d5343548d7b2b2dcf87b9df0b93f2aa83f64cfddf58eee5889ac497ab9d", @ANYRESHEX=r0]) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000300)) renameat(0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', r1, &(0x7f0000000400)='./bus\x00') chdir(&(0x7f0000000000)='./file1\x00') r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x1000) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) lseek(r5, 0xfffffffffffffffe, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r6 = open(&(0x7f0000000180)='./bus\x00', 0x444342, 0x22) sendfile(r3, r6, 0x0, 0x8400fffffffa) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000280)) 05:58:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@empty, 0x7}, 0x20) [ 245.774024][ T25] audit: type=1326 audit(1619675912.661:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18263 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000000)={&(0x7f0000000080)={0xa, 0x4e23, 0x0, @remote}, 0x1c, 0x0}, 0x20004804) [ 245.856121][T18325] loop2: detected capacity change from 0 to 240 [ 245.860897][T18327] loop1: detected capacity change from 0 to 264192 [ 245.871217][T18327] FAT-fs (loop1): Unrecognized mount option "ÿÿ/üB„J}_Cá­¸ F MôUJÇœSCT{+-χ¹ß “òªƒöLýßXî刚ė«0x0000000000000003" or missing value 05:58:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="700000000e4849"], 0x70}}, 0x0) 05:58:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f00000001c0)={&(0x7f0000000340), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x8d294265b5eba5fb, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @local}]}, 0x28}}, 0x0) 05:58:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x18, 0x1, 0x3, 0x801, 0x0, 0x0, {}, [@NFQA_VLAN={0x4}]}, 0x18}}, 0x0) [ 245.871342][ T25] audit: type=1326 audit(1619675912.761:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18321 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01001106040000001e717444cf000700cb66"], 0x28}}, 0x0) 05:58:32 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x80a01) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000b40)={0x13}) [ 245.956445][T18348] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 245.977061][T18350] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 245.992626][T18325] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 [ 246.001100][T18327] loop1: detected capacity change from 0 to 264192 05:58:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0x5, 0x0, 0x0, 0x0) 05:58:33 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/wireless\x00') 05:58:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001a000000070400000061000008000100000000000400cc00ba1ab01cc750a4599070a7e2d286de5b76008029e0a3f9f8ddc603007d92d92a9833992b6cc72ca92eaefa6ec8cec07f5c3f4bca74d1de37b9798e6e5fc97bff5977d81fbf5d38c756483ed5df4cf2f3a140"], 0x28}}, 0x0) 05:58:33 executing program 3: clock_gettime(0x6, &(0x7f00000002c0)) 05:58:33 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = dup2(r0, 0xffffffffffffffff) fcntl$setstatus(r3, 0x4, 0x33e413064cfbc733) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) 05:58:33 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443031310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:33 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="02434430fe310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:33 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x80) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x0) 05:58:33 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x80) setsockopt$inet6_buf(r0, 0x29, 0x22, 0x0, 0x0) [ 246.767313][T18379] loop2: detected capacity change from 0 to 240 [ 246.779728][T18379] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 [ 246.786600][T18380] loop1: detected capacity change from 0 to 264192 05:58:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000080)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0}, 0x0) 05:58:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f00000115c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1c"], 0x50}, 0x0) [ 246.860101][T18395] loop2: detected capacity change from 0 to 240 [ 246.867180][T18399] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 246.889558][T18395] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 [ 246.899977][T18403] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 05:58:33 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000004480), 0x0, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) 05:58:34 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/icmp\x00') timerfd_settime(r0, 0x0, &(0x7f0000000040)={{}, {0x77359400}}, 0x0) 05:58:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0x6, 0x0, 0x0, 0x0) 05:58:34 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="02434430302e0100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000012c0)={&(0x7f0000003940)={0xa, 0x4e20, 0x0, @mcast2, 0x7}, 0x1c, &(0x7f0000001240)=[{&(0x7f0000000040)="e0f1581c33f724898cd2322eab7680cf4fe63f73f6198fc2fd124b737a26e147b400d0e2c8de30e85d7f2baa9a1e378c48935e86211edc4cd9ef1b2222b88c9a3f0426c34e2edd159bf67b486434eb78c823ca059ae4141f09cffeb64f0d68092ccd3b4df47e9073105f32e8e4ccc2590012b630a785a0e0d287a226af44b90af186d6fb1458f5cc58ae9629acecacc4", 0x90}, {&(0x7f0000000100)="fc65ed4fc88409ddc115e96c357dd5e0bad02832f034a78d2f119f412c30d40dba9c0ff1b56073cc9dbe0398910a39", 0x2f}, {&(0x7f0000000140)="f9a429e02428860a7d6eb744fe519424c4481e1935534ecfd6788a352fcd13cb840067a076c85a719a27dda4dee2dedc81ae24d2f68c0029728a6b1973554001dd538f996543ae347b1d8ccf188d46b429aac5cb60c468415643b5d5e6afef16d75f3d7868", 0x65}, {&(0x7f00000001c0)="207071a2bf898764964b73e3a8f18d9abe07ad17dafaa5eb50dde6c0cd524ea9954e34cb883eb7bb207f030da9dfb637c4a3b92537df584ff67cacb4f48ae64ee07f7e39b23970bd90c099bc82c000dc1e8e8a49a223cad0fa1519d9e3e87dbe132cfcd12be08508f058017f6e87c2e6904f49720c9dc6f7c1ba5a", 0x7b}, {&(0x7f0000000240)="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", 0x9aa}], 0x5}, 0x2000c08b) 05:58:34 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x104) r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x7a}], 0x801052, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000180)='./file1\x00', 0x87) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = dup2(r0, 0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) fsetxattr$security_ima(r3, &(0x7f00000001c0), &(0x7f0000000240)=@v2={0x3, 0x2, 0x12, 0x5, 0xf9, "32e7f957ed767198083e9cc67493cd74353b34a62bccf3190654e4f66814e9769949765f9259240f2b0eccd4e44375c1083a6a978baf6f488f363f8285ae5d36c2907455163a1f00523330a02dd371657ac92d4e70783b2e3b18c30f561f96a5c21505c5a75132bedf4e578a8b4e3aec51dcc6627cb5500b2a9ef23bbf24d433883dd649f420c675ff6fc0042c88fb0bab77d022f698a028467201fc6a076d42c91bac9db766863d444d9547bd8ab1e8325dde2d8d2bd8b48ea38e75ff4cb8f9322397ab0c45a4fa700b38cf44ddef1f0380a9b7d88dcc0ff4ed4ea2d6f82eb62bd70aa4319f3e61a6342c46047a7d2cfa76ee9086ef9eb044"}, 0x102, 0x2) sendfile(r1, r5, 0x0, 0x8400fffffffa) 05:58:34 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)={0x77359400}) [ 247.600427][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 247.600441][ T25] audit: type=1326 audit(1619675914.491:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18373 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:34 executing program 3: syz_open_procfs(0x0, 0x0) fork() syz_open_procfs(0x0, &(0x7f0000002040)='net/protocols\x00') 05:58:34 executing program 0: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) munlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) [ 247.684885][T18436] loop1: detected capacity change from 0 to 264192 [ 247.692057][ T25] audit: type=1326 audit(1619675914.581:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18434 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 247.722291][T18439] loop2: detected capacity change from 0 to 240 05:58:34 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1, 0x0, &(0x7f0000000040)) 05:58:34 executing program 3: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) fstat(r0, &(0x7f0000000000)) 05:58:34 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x101800, 0x0) r4 = accept$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) creat(&(0x7f0000000f40)='./bus\x00', 0x2) poll(&(0x7f0000000240)=[{r0, 0x1}, {r3}, {r4, 0x8000}], 0x3, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x5200810}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x9}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x1}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x6}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0xfffffffe}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x9}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f0000000f00)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000e40)={0x58, 0x13, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x7}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x4}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}]}, 0x58}, 0x1, 0x0, 0x0, 0x801}, 0x4000014) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000640), 0x290000, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffa) r6 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./bus\x00', 0xfff, 0xa, &(0x7f0000000c40)=[{&(0x7f0000000480)="48770ef726f25279052697af287b867ad3186ec73f8756cbb65699f73ffc59d77cae2264f925f95b8628ec94537ab00a5a023f7f5b62b15558c4e48231c6be49c79a8bed02cf1a91a06cdff7934f2e60fcae8c1d1bee98736e0b66f2dc12e656f9b4565f4c8ca2e51fd452316f062ad7c92b757bd2e73b9ce0d52ae40ad148c09cd6302e148069d281539cab48c9ad1de309b1c0ce384eae27569a0b8be3e9da01ff8837e6af426c4a08ad812429d85bdeaa9bf44486383bb7c2b5d71b301bbddad04168e686a0b3ddcd95d9785cba4d84c6", 0xd2, 0x7}, {&(0x7f0000000580)="ae824dc93083fd2e2d9424b3a9fcc254fd11d235e4cfce8f4878c438a1502b6158593301bdcaa58834646fb4156d77b6cbd498d9c3b3ef4848c3c7f15915e924126b3baa9986bf4917f65de7430800838fe4650633eaa87952a6501b25fd03ffb8c72bf5f9afdc505f7cbdab55d99fe5deb383337558a772c3dcd110ee8b037a", 0x80, 0xcd3}, {&(0x7f00000006c0)="62d7de95a15d0d90ef70ad30f21b40b73cef80be2d9c4fadc13521b6cce42cb7c3f5676d46df0870b938163fdba8bb38d2e8b79851f538255869214d3aa72c2b6d71474f6c9fa79ba5b24515299d93d7de9f9828ecf2875ead5717fb9bbc7006e9e769077c0c78be5b1010f80eaa9324b9974e7068a019cdcf4f55bc3e51e85e8ae12ca2a80c6c381202739155b2f5afca9cf2a593f69af4ff92cdb3234aeee73de86d946c8f06b5ab00680d0f98b62e9a34", 0xb2, 0x9}, {&(0x7f0000000600)="b4340cbadf97", 0x6, 0x56b77a65}, {&(0x7f0000000780)="e6c387cb72bff4e1d9750f78b59c81c2d3c6c719d0477e859ae99ef6ad7c40a8053a26b60f2b5fce45de1748a503e9939448a01f81bb03c36367912911ab1ad4c64ea96baf86f2ea2daa4bf8f604cfec", 0x50, 0x2}, {&(0x7f0000000800)="61e8dc445588e4003be62b11ce24ac1226a6bcc60bc48ba180f760077633a93ba2024938bdd52fb8a7978149e8334a475b0ababe78059a77b7989b0fddf4f3246b417e47c044b8cdb481eec4c731ebd8d12306e752375cc82d58d095e4dac2393a0120f1bb3cc51698fd729f4803a92dc230dac9ffa777c3f6eb4e92543a2c967adf5ef09ba31b18286a2891cee5e22bc321a84b2e45ddd1db1c25e7e0da1e1420d4556d8ced17b1626e819180f5bbf8dd", 0xb1, 0x4b3}, {&(0x7f00000008c0)="f2b46096729ede9bca0d8988d26691a1560f92957f20d5c54bf650e17efe73aac35b1b7edf743cbc94e31d3ddcac478390e8e248ac5cd84d8ca3944d55b35a8598c0610c6e36f22d2ddadc5c0a03d672ffff478dc0d65eebdbfc1db3d9f9ebc37c714be15768ff45a2a5be47be17d89ed2ca5304ba292e06c434af2e6f8c7de9c2089b962126f0ab18cb08f50a25e88bb74f9530e2a4296f1a976e05eeef6b4ed3f17ff5e0403e69e5efc2f195df6c3379501dadaaf0d253162ae0942e37e5371acc73701b74129c79719a4c2a080c14eb262c19cb2ea2cb5077fa5172302406e402d4", 0xe3, 0x4}, {&(0x7f00000009c0)="eda0ede1d42acf7b0493b663903df5865abc67071eadd37adf809d2480047f7cb6e0fba25d2896e7642a32654472926401891b9f19b5ec44f7cf7dedb4425451acfbe1e60b82437a89b5b28004fb14d31c23f210b9016328efef3a73eca8983809309d3c77e2510a8056ee47ac02a6e3775d1edec99e8bd046c5135ac0fde289795e5bde34117a8b9caab09d46178e48a8a8da525f79be548656c71d91c02fd6e0c90235db2654718e8e814ed03ca30fcfd8e1d4ab952cf4f44692ca806dc5a37b6f41", 0xc3, 0x7}, {&(0x7f0000000ac0)="1c86fc0575a97a64728c3f74aaacfa5950ad3a0b10eb5a993bc5b82f204d16bbcc252fd0147f0b1204c2a41bf2e01950840dacea8c9430c806f41fe8ce16eeada0ee9bb2efec20b6ce46b2690faa3d3dcdb78382f8314b7054647abef5d6240c42cdff4a0327f37ad6e7f0f07cd114faa412c3340e36801ab186c8ab83d22722939f950071992e7dd6fe0cf2631e989ed687", 0x92, 0x7e3d}, {&(0x7f0000000b80)="59e3e7cc96e6fc26663138fd71206997b2a0f3f4cce2770f306c49c4b0801fae1e65c6e6e9200bf4326af75cce89f76c950a7b1eec5adafbab86845421d6f061a19c32b3a06b1e64c424367d5dbb73e7b67efcc5737cfe177f6bdadbb846aa947382b51df1b65c6ae35654692c9897ee68d9f5fa1ccc9faa33f0397b4a2b123efdb1", 0x82, 0xffff}], 0x20, &(0x7f0000000d40)={[{@auto_da_alloc}, {@nomblk_io_submit}, {@block_validity}, {@bh}, {@errors_remount}, {@nouid32}, {@grpid}, {@i_version}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@appraise_type}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) sendfile(r1, r6, 0x0, 0x8400fffffffa) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000f80), 0x70b680, 0x0) 05:58:34 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030300100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 247.758846][T18439] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 [ 247.782773][T18436] loop1: detected capacity change from 0 to 264192 05:58:34 executing program 0: r0 = msgget(0x3, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x800) [ 247.847364][T18475] loop2: detected capacity change from 0 to 240 [ 247.860999][T18475] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 [ 247.928629][T18482] loop1: detected capacity change from 0 to 264192 05:58:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0x7, 0x0, 0x0, 0x0) [ 248.519313][ T25] audit: type=1326 audit(1619675915.411:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18434 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:35 executing program 4: r0 = msgget(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x1, "8ceb1bceaa0eef"}, 0xf, 0x800) 05:58:35 executing program 0: r0 = msgget(0x1, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000001c0)={{}, 0x0, 0x0, 0x100}) 05:58:35 executing program 3: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) writev(r0, 0x0, 0x0) 05:58:35 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030fe0100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 248.590181][ T25] audit: type=1326 audit(1619675915.481:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18496 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:35 executing program 0: pipe2(&(0x7f0000000340), 0x0) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 05:58:35 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) bind(r0, &(0x7f0000000600)=@in={0x10, 0x2}, 0x10) 05:58:35 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310200004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) [ 248.684929][T18505] loop2: detected capacity change from 0 to 240 [ 248.712409][T18505] isofs_fill_super: bread failed, dev=loop2, iso_blknum=60, block=120 [ 248.859465][T18523] loop2: detected capacity change from 0 to 240 [ 248.889411][T18482] loop1: detected capacity change from 0 to 264192 [ 248.896232][T18482] FAT-fs (loop1): Unrecognized mount option "Çš‹íÏ‘ lß÷“O.`ü®Œî˜sn fòÜæVù´V_LŒ¢åÔR1o*×É+u{Òç;œàÕ*ä [ 248.896232][T18482] ÑHÀœÖ0.€iÒSœ«HÉ­ã ±ÀÎ8N®'Vš ‹ãéÚÿˆ7æ¯BlJ­$)Ø[Þª›ôD†8;·Âµ×0½ÚÐAh憠³ÝÍ•Ùx\ºM„Æ" or missing value 05:58:35 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x40000) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:58:35 executing program 0: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) 05:58:35 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x4d46dad3c115452f, 0x0) [ 249.070994][T18554] loop1: detected capacity change from 0 to 264192 05:58:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0x8, 0x0, 0x0, 0x0) 05:58:36 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310300004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x19, 0x0, 0x0, 0x0) 05:58:36 executing program 0: r0 = msgget(0x1, 0x608) msgctl$IPC_RMID(r0, 0x0) 05:58:36 executing program 3: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x0) 05:58:36 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc1}}) sendfile(r1, r4, 0x0, 0x8400fffffffa) acct(&(0x7f0000000140)='./file1\x00') [ 249.423979][ T25] audit: type=1326 audit(1619675916.311:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18496 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 249.514067][T18576] loop1: detected capacity change from 0 to 264192 [ 249.536361][ T25] audit: type=1326 audit(1619675916.421:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18569 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:36 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310400004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:36 executing program 0: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x2000) [ 249.541431][T18579] loop2: detected capacity change from 0 to 240 05:58:36 executing program 3: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 05:58:36 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000140)='./file1\x00', 0x39) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000180)={0x3, 'batadv0\x00', {0x1f}}) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 249.612196][T18591] Process accounting resumed 05:58:36 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310600004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:36 executing program 0: execve(0x0, &(0x7f0000000580)=[&(0x7f0000000500)=':{\x00', &(0x7f0000000540)='+\x00'], 0x0) [ 249.639451][T18595] loop2: detected capacity change from 0 to 240 [ 249.675452][T18603] loop1: detected capacity change from 0 to 264192 [ 249.723756][T18614] loop2: detected capacity change from 0 to 240 05:58:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0x9, 0x0, 0x0, 0x0) 05:58:37 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x80) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000000)="d7fe8ff4abfd3dfaf4ed0fc612f18b22", 0x10) 05:58:37 executing program 0: msgget(0x0, 0x518) 05:58:37 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r1, r4, &(0x7f0000000140)=0x4, 0xe000000000000) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) 05:58:37 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310800004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:37 executing program 4: mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) mprotect(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) [ 250.353631][ T25] audit: type=1326 audit(1619675917.241:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18569 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:37 executing program 0: execve(0x0, &(0x7f0000000240)=[&(0x7f0000000200)='\x00'], &(0x7f00000003c0)) 05:58:37 executing program 3: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f00000000c0)=""/161) [ 250.435578][ T25] audit: type=1326 audit(1619675917.321:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18629 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 250.464745][T18638] loop1: detected capacity change from 0 to 264192 [ 250.471659][T18636] loop2: detected capacity change from 0 to 240 05:58:37 executing program 3: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) pipe2(&(0x7f00000005c0), 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 05:58:37 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 05:58:37 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310900004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:37 executing program 3: open$dir(&(0x7f00000000c0)='./file0\x00', 0x200, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2) [ 250.683720][T18669] loop2: detected capacity change from 0 to 240 05:58:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0xa, 0x0, 0x0, 0x0) 05:58:38 executing program 3: munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x7, 0x80412, 0xffffffffffffffff, 0x0) 05:58:38 executing program 0: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) fork() 05:58:38 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310f00004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:38 executing program 4: chroot(&(0x7f0000000000)='./file0\x00') execve(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)=[&(0x7f0000000200)='\x00'], &(0x7f00000003c0)=[&(0x7f0000000280)=']\xa4+!\x00', &(0x7f00000002c0)=']\xa4+!\x00']) 05:58:38 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000140)) dup2(r0, 0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) [ 251.263461][ T25] audit: type=1326 audit(1619675918.151:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18629 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x19, 0x0, 0x0, 0x0) [ 251.351999][ T25] audit: type=1326 audit(1619675918.241:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18690 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 251.386613][T18698] loop2: detected capacity change from 0 to 240 [ 251.387571][T18700] loop1: detected capacity change from 0 to 264192 05:58:38 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030311400004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:38 executing program 0: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) writev(r0, &(0x7f0000002880)=[{&(0x7f0000000480)='p', 0x1}, {0x0}, {&(0x7f00000016c0)="19", 0x1}], 0x3) 05:58:38 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030312500004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 251.494140][T18720] loop2: detected capacity change from 0 to 240 [ 251.558162][T18722] ================================================================== [ 251.566295][T18722] BUG: KCSAN: data-race in mark_buffer_dirty_inode / sync_mapping_buffers [ 251.574838][T18722] [ 251.577174][T18722] write to 0xffff888105e5c190 of 8 bytes by task 18700 on cpu 0: [ 251.584896][T18722] sync_mapping_buffers+0x155/0x8b0 [ 251.590113][T18722] fat_file_fsync+0xa9/0x100 [ 251.594717][T18722] vfs_fsync_range+0x107/0x120 [ 251.599518][T18722] generic_file_write_iter+0x103/0x130 [ 251.605099][T18722] do_iter_readv_writev+0x2cb/0x360 [ 251.611038][T18722] do_iter_write+0x112/0x4c0 [ 251.615984][T18722] vfs_iter_write+0x4c/0x70 [ 251.620529][T18722] iter_file_splice_write+0x40a/0x750 [ 251.625917][T18722] direct_splice_actor+0x80/0xa0 [ 251.630872][T18722] splice_direct_to_actor+0x345/0x650 [ 251.636256][T18722] do_splice_direct+0xf5/0x170 [ 251.641038][T18722] do_sendfile+0x773/0xda0 [ 251.645469][T18722] __x64_sys_sendfile64+0xf2/0x130 [ 251.650605][T18722] do_syscall_64+0x4a/0x90 [ 251.655048][T18722] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 251.660969][T18722] [ 251.663302][T18722] read to 0xffff888105e5c190 of 8 bytes by task 18722 on cpu 1: [ 251.670943][T18722] mark_buffer_dirty_inode+0x92/0x1d0 [ 251.676339][T18722] fat_mirror_bhs+0x205/0x330 [ 251.681044][T18722] fat_ent_write+0xc2/0xd0 [ 251.685480][T18722] fat_chain_add+0x149/0x400 [ 251.690097][T18722] fat_get_block+0x429/0x5a0 [ 251.694718][T18722] __block_write_begin_int+0x4a2/0x1060 [ 251.700324][T18722] cont_write_begin+0x522/0x850 [ 251.705186][T18722] fat_write_begin+0x61/0xf0 [ 251.709791][T18722] generic_perform_write+0x196/0x3a0 [ 251.715085][T18722] __generic_file_write_iter+0x161/0x300 [ 251.720720][T18722] generic_file_write_iter+0x75/0x130 [ 251.726096][T18722] do_iter_readv_writev+0x2cb/0x360 [ 251.731305][T18722] do_iter_write+0x112/0x4c0 [ 251.735928][T18722] vfs_iter_write+0x4c/0x70 [ 251.740450][T18722] iter_file_splice_write+0x40a/0x750 [ 251.746616][T18722] direct_splice_actor+0x80/0xa0 [ 251.751591][T18722] splice_direct_to_actor+0x345/0x650 [ 251.757019][T18722] do_splice_direct+0xf5/0x170 [ 251.761793][T18722] do_sendfile+0x773/0xda0 [ 251.766208][T18722] __x64_sys_sendfile64+0xf2/0x130 [ 251.771349][T18722] do_syscall_64+0x4a/0x90 [ 251.775754][T18722] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 251.781641][T18722] [ 251.783966][T18722] Reported by Kernel Concurrency Sanitizer on: [ 251.790161][T18722] CPU: 1 PID: 18722 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 251.798560][T18722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 05:58:38 executing program 4: accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) 05:58:38 executing program 0: acct(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) [ 251.808628][T18722] ================================================================== [ 251.861332][T18733] loop2: detected capacity change from 0 to 240 05:58:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0xb, 0x0, 0x0, 0x0) 05:58:39 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x164) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = dup2(r0, 0xffffffffffffffff) io_submit(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r3, &(0x7f0000000140)="c32b6a43b76d9a39afe931b7d12e2183b5a3ce59c39bc76b15", 0x19, 0x9927, 0x0, 0x3}]) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) 05:58:39 executing program 0: getgroups(0x3, &(0x7f00000017c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0]) 05:58:39 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030314b00004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:39 executing program 4: msgget(0x1, 0x608) 05:58:39 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031fe00004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:39 executing program 3: r0 = msgget(0x1, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000040)=""/227) 05:58:39 executing program 0: getgroups(0x4, &(0x7f0000000140)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]) setresgid(r0, 0xffffffffffffffff, 0xffffffffffffffff) [ 252.272460][T18754] loop2: detected capacity change from 0 to 240 [ 252.305658][T18760] loop1: detected capacity change from 0 to 264192 05:58:39 executing program 0: mount(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 05:58:39 executing program 4: clock_settime(0x0, &(0x7f0000000180)) 05:58:39 executing program 3: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) fcntl$getown(r0, 0x5) [ 252.404955][T18774] loop2: detected capacity change from 0 to 240 05:58:39 executing program 0: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:58:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0xc, 0x0, 0x0, 0x0) 05:58:40 executing program 3: mlock(&(0x7f0000ffa000/0x1000)=nil, 0x1000) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 05:58:40 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310003004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:40 executing program 4: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) fork() 05:58:40 executing program 0: mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 05:58:40 executing program 1: r0 = socket$inet(0x2, 0xa, 0x3) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000001800), &(0x7f0000001840)=0x8) r1 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x13, r2, 0x3000) ftruncate(r3, 0x1000) r4 = accept4(r1, &(0x7f0000000140)=@ethernet={0x0, @remote}, &(0x7f00000001c0)=0x80, 0x80400) bind(r4, &(0x7f0000000240)=@nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x10}, 0x80) lseek(r3, 0x0, 0x2) dup2(r1, 0xffffffffffffffff) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffa) r6 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r6, 0x0, 0x8400fffffffa) [ 253.087178][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 253.087205][ T25] audit: type=1326 audit(1619675919.974:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18747 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@un=@abs={0x8}, 0x8) [ 253.183392][T18814] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) [ 253.184015][T18813] loop2: detected capacity change from 0 to 240 [ 253.198280][ T25] audit: type=1326 audit(1619675920.084:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18808 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:40 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310005004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:40 executing program 3: r0 = msgget(0x0, 0x0) msgrcv(r0, 0x0, 0xb9, 0x0, 0x800) 05:58:40 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fork() mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000001880)=""/102400) [ 253.240075][T18821] loop1: detected capacity change from 0 to 264192 05:58:40 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310012004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 253.314568][T18832] loop2: detected capacity change from 0 to 240 05:58:40 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) [ 253.435734][T18850] loop2: detected capacity change from 0 to 240 05:58:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0xd, 0x0, 0x0, 0x0) 05:58:40 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 05:58:40 executing program 0: mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mlock(&(0x7f0000ffa000/0x1000)=nil, 0x1000) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 05:58:40 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310013004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000005c0)="e0d5caa7d1133560d491830cc36faca01fcaf60494abc7e1d54e059a6f9960ebdd87d3fb7565be7a2fdac5a839484d7898a7fff9d9ed4eafbf7a4264df3f08152872d4c96247023276f1f0e89fa387d68c6d5e15a9c00d71", 0x58}, {&(0x7f0000000680)="c2002cd5cb01420079dada073c590bbd4f1448e59f4fc17be8c7e2ceff495dd17ec21e997f457ceddec1ba1619b97a7ee5909e5e79d678e2f67f85c83c778e7026f401bf95a54f8037937a85e2182668183572aec45ec48d3531592c9285822b17654f71376848fd40e12a5ef4aa809914335c6d66c2985acbd7210b9be6a7d7bb0e5930a3a4f75830", 0x89}], 0x2}, 0x0) 05:58:40 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000140)='./file1\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x20400, 0x20) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 254.017646][ T25] audit: type=1326 audit(1619675920.904:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18808 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 254.111123][T18875] loop2: detected capacity change from 0 to 240 [ 254.132435][ T25] audit: type=1326 audit(1619675921.024:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18871 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:41 executing program 3: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) fork() 05:58:41 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) 05:58:41 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310014004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 254.149455][T18878] loop1: detected capacity change from 0 to 264192 05:58:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@file={0xa}, 0xa) 05:58:41 executing program 4: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) fork() 05:58:41 executing program 3: unlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x800) [ 254.283182][T18907] loop2: detected capacity change from 0 to 240 05:58:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0xe, 0x0, 0x0, 0x0) 05:58:41 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = dup2(r0, 0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r6 = fsmount(r3, 0x1, 0x8a) ioctl$KDSETLED(r6, 0x4b32, 0x80000001) r7 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r7, &(0x7f0000000140)='./file1/file0\x00', 0x440100, 0x10e) sendfile(r1, r5, 0x0, 0x8400fffffffa) 05:58:41 executing program 3: mount(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 05:58:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[], 0xb8}, 0x0) 05:58:41 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031feff004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:41 executing program 4: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x2010d, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c) [ 254.963968][ T25] audit: type=1326 audit(1619675921.854:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18871 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:42 executing program 0: mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000000)=""/100) 05:58:42 executing program 3: semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)=""/94) [ 255.062217][ T25] audit: type=1326 audit(1619675921.954:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18933 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 255.062620][T18938] loop2: detected capacity change from 0 to 240 [ 255.097022][T18935] loop1: detected capacity change from 0 to 264192 05:58:42 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310102004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:42 executing program 3: getrlimit(0x0, &(0x7f0000000000)) semctl$GETALL(0x0, 0x0, 0x6, &(0x7f0000000180)=""/4096) 05:58:42 executing program 0: lchown(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 05:58:42 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310103004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 255.224121][T18960] loop2: detected capacity change from 0 to 240 [ 255.326411][T18976] loop2: detected capacity change from 0 to 240 05:58:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0x10, 0x0, 0x0, 0x0) 05:58:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003cc0), 0x1, 0x0, 0x0) 05:58:42 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2000, 0x1) fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 05:58:42 executing program 4: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$sock_int(r0, 0xffff, 0x1015, &(0x7f0000000040), 0x4) 05:58:42 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310104004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:42 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000180)='./file1\x00', 0xfb) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000140)='./file1\x00', 0x8, 0x1) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fallocate(r5, 0x40, 0x3, 0x6) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 255.892378][ T25] audit: type=1326 audit(1619675922.784:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18933 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:42 executing program 3: io_pgetevents(0x0, 0x0, 0x3, &(0x7f0000000040)=[{}, {}, {}], &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100), 0x21}) 05:58:42 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310105004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 255.992134][ T25] audit: type=1326 audit(1619675922.884:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18997 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 256.021733][T19000] loop2: detected capacity change from 0 to 240 [ 256.024268][T19001] loop1: detected capacity change from 0 to 264192 05:58:43 executing program 3: getgroups(0x1, &(0x7f0000000100)=[0x0]) 05:58:43 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310106004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 256.106393][T19015] loop2: detected capacity change from 0 to 240 05:58:43 executing program 3: semctl$SETALL(0x0, 0x0, 0x9, 0x0) 05:58:43 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0xa) [ 256.246671][T19035] loop2: detected capacity change from 0 to 240 05:58:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0x11, 0x0, 0x0, 0x0) 05:58:43 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310107004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:43 executing program 3: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000029c0)) 05:58:43 executing program 4: fcntl$lock(0xffffffffffffff9c, 0x8, &(0x7f00000008c0)) 05:58:43 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x2, 0x0, 0x7f, 0x0, 0xffff, 0x114406, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x0, 0x1}, 0x30, 0x1, 0x2, 0x3, 0x3ff, 0xffffffff, 0x8, 0x0, 0x81, 0x0, 0xffffffffffff8001}, r1, 0x0, r1, 0x0) fstat(r2, &(0x7f0000000240)) r3 = dup2(r0, 0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = openat$cgroup_ro(r3, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r5, 0x4c00, r6) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r7, 0xffffffffffffffff, 0x0, 0x8400fffffffa) 05:58:43 executing program 0: r0 = socket(0x18, 0x0, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8943, &(0x7f0000000040)) [ 256.826902][ T25] audit: type=1326 audit(1619675923.714:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18997 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001900)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000001240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f00000019c0)=ANY=[@ANYRESOCT], 0x140}}], 0x2, 0x0) 05:58:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003840)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x0) 05:58:43 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310108004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 256.916413][T19061] loop2: detected capacity change from 0 to 240 [ 256.934570][ T25] audit: type=1326 audit(1619675923.824:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19060 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 256.958723][T19065] loop1: detected capacity change from 0 to 264192 05:58:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000700)=[{{&(0x7f0000000080)={0xa, 0x4e20, 0x0, @empty}, 0x1c, 0x0}}, {{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x158}}], 0x2, 0x0) 05:58:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$sock(r0, &(0x7f0000002a00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000029c0)=[@mark={{0x14}}], 0x18}, 0x0) 05:58:43 executing program 3: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000140)='user\x00', 0x0) [ 257.081227][T19091] loop2: detected capacity change from 0 to 240 05:58:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0x12, 0x0, 0x0, 0x0) 05:58:44 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310109004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:44 executing program 4: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x89a1, &(0x7f0000000040)) 05:58:44 executing program 3: io_setup(0x200, &(0x7f0000000280)) io_setup(0x3, &(0x7f0000000200)=0x0) io_destroy(r0) 05:58:44 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r3, &(0x7f0000000140)='./bus\x00', 0x85c2, 0x82) dup2(r0, 0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) 05:58:44 executing program 0: r0 = socket$inet(0xa, 0x3, 0x86) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000440)) 05:58:44 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031010a004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 257.858138][T19119] loop1: detected capacity change from 0 to 264192 [ 257.864845][T19123] loop2: detected capacity change from 0 to 240 05:58:44 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 05:58:44 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000009c0)=[{{&(0x7f0000001140)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="780000000000000011"], 0x370}}], 0x2, 0x0) 05:58:44 executing program 4: timer_create(0x0, 0x0, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) [ 257.975703][T19143] loop2: detected capacity change from 0 to 240 05:58:44 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031010b004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x88, 0x10, 0x0, 0x0) [ 258.083197][T19158] loop2: detected capacity change from 0 to 240 05:58:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0x25, 0x0, 0x0, 0x0) 05:58:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002400)=[{{&(0x7f0000001140)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f00000012c0)={0xa, 0x4e22, 0x0, @mcast2, 0x34000}, 0x1c, 0x0}}], 0x2, 0x0) 05:58:45 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031010c004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_ADD_KEY(0xffffffffffffffff, 0x0, 0x0) sendmsg$IEEE802154_ASSOCIATE_REQ(r2, &(0x7f0000000380)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010025bd7000fddbdf2501000000050007000e00000005001d001e000000050011008000000005001100330000000c0009000200aaaaaaaaaaaa050007001a0000000c0009000200aaaaaaaaaaaa060007"], 0x5c}}, 0x0) sendmsg$IEEE802154_ASSOCIATE_REQ(0xffffffffffffffff, 0x0, 0x0) 05:58:45 executing program 4: r0 = add_key$keyring(&(0x7f0000000b00), &(0x7f0000000b40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) 05:58:45 executing program 1: r0 = socket(0x400000000000010, 0x802, 0x0) write(r0, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x22, &(0x7f0000000100)={0x0, {{0x2, 0x0, @private}}}, 0x88) r3 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x4}], 0x140012, &(0x7f0000000240)=ANY=[@ANYRESDEC=r0, @ANYRES64, @ANYRESOCT=r2, @ANYRES16=r1, @ANYBLOB="7c25c74e74bd5858640c694e662cb975e6aac308506c401f4bf4aecdc38b11ff0f099057c6b86403278105c72d6ee391576fc18a54a107c5184f1e895394966dd7a71791615eb776521512724e9c9246654b67a9e83e703d590b2849e19a88f6689ff4af504defd316ea4163a76bc299401a9de32eb93fc18f9909715ba4be6fb861fd13bc68d8d97168881e206b831ee1ab71af70c344c6df5e951b84d4dd59f8982902beaa3947690e", @ANYRES64=r0, @ANYBLOB="9aab3e8bedbf4ee900b7a250304dd6337c7d17ac7f8da064bc5edaedb8675fe6cbfdae4c1d74ce472cd902865b1d2bcd13e66935854a2c2109902c4a3a"]) chdir(&(0x7f0000000000)='./file1\x00') r4 = creat(&(0x7f0000000100)='./file1\x00', 0x0) mkdirat(r4, &(0x7f0000000080)='./file1\x00', 0x86) r5 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r5, 0x1000) lseek(r5, 0x0, 0x2) dup2(r3, 0xffffffffffffffff) r6 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffa) [ 258.686707][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 258.686721][ T25] audit: type=1326 audit(1619675925.574:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19114 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:45 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x2000) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x5452, &(0x7f0000000280)={{}, 0x0, 0x0, 'id0\x00', 'timer1\x00'}) 05:58:45 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002400)=[{{&(0x7f0000001140)={0xa, 0x4e22, 0x0, @mcast2, 0x6}, 0x1c, 0x0}}], 0x1, 0x0) 05:58:45 executing program 4: semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0xfe01}], 0x1, 0x0) [ 258.778557][T19188] loop1: detected capacity change from 0 to 264192 [ 258.785545][ T25] audit: type=1326 audit(1619675925.674:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19187 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 258.810583][T19193] loop2: detected capacity change from 0 to 240 05:58:45 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x7fffffff) 05:58:45 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031010d004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:45 executing program 3: syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x800a, &(0x7f0000000400)=ANY=[@ANYBLOB='d']) [ 258.984814][T19223] loop2: detected capacity change from 0 to 240 05:58:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0x30, 0x0, 0x0, 0x0) 05:58:46 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x8cc3, 0x0) 05:58:46 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031010e004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:46 executing program 3: r0 = socket(0x18, 0x0, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x80047453, 0x0) 05:58:46 executing program 4: r0 = socket$inet(0x2c, 0x3, 0x0) sendmsg$sock(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) [ 259.604152][T19216] loop1: detected capacity change from 0 to 264192 [ 259.613114][ T25] audit: type=1326 audit(1619675926.504:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19187 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 259.721880][ T25] audit: type=1326 audit(1619675926.614:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19254 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 259.725105][T19257] loop2: detected capacity change from 0 to 240 05:58:46 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x109000, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 05:58:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003840)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f00000004c0)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000700)=[@hoplimit={{0x14}}], 0x10}}], 0x2, 0x0) 05:58:46 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002400)=[{{&(0x7f0000001140)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0xfffffffffffffda3, 0x0}}], 0x2, 0x0) 05:58:46 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031010f004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002400)=[{{&(0x7f0000001140)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f00000012c0)={0x3, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x2, 0x0) 05:58:46 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310110004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:46 executing program 3: r0 = socket(0x18, 0x0, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8927, &(0x7f0000000040)) [ 259.894721][T19283] loop2: detected capacity change from 0 to 240 [ 259.926251][T19289] loop1: detected capacity change from 0 to 264192 [ 260.004253][T19301] loop2: detected capacity change from 0 to 240 05:58:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0x48, 0x0, 0x0, 0x0) 05:58:47 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x2, 0x0, 0x10000}}) 05:58:47 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0505405, &(0x7f0000000280)={{}, 0x0, 0x0, 'id0\x00', 'timer1\x00'}) 05:58:47 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310111004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000640)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000003c0)="dd", 0x1}], 0x1}}], 0x2, 0x8004) 05:58:47 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) sendfile(r2, r0, 0x0, 0xffffffffffffffa6) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) dup2(r0, 0xffffffffffffffff) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x10000000) [ 260.552667][ T25] audit: type=1326 audit(1619675927.444:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19254 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:47 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) 05:58:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003840)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f00000004c0)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000700)=[@hoplimit={{0x14, 0x29, 0x43, 0xfff}}], 0x18}}], 0x2, 0x0) [ 260.648035][T19328] loop2: detected capacity change from 0 to 240 [ 260.658511][ T25] audit: type=1326 audit(1619675927.544:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19326 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:47 executing program 3: socket(0x2, 0xa, 0x0) socket$inet(0x2, 0xa, 0x0) 05:58:47 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310112004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 260.693089][T19333] loop1: detected capacity change from 0 to 264192 05:58:47 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002400)=[{{&(0x7f0000001140)={0xa, 0x4e22, 0x0, @mcast2, 0x17}, 0x1c, 0x0}}], 0x1, 0x0) 05:58:47 executing program 3: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8904, &(0x7f0000000040)) [ 260.833605][T19354] loop2: detected capacity change from 0 to 240 [ 261.473619][ T25] audit: type=1326 audit(1619675928.364:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19326 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 05:58:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0) 05:58:48 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x40505412, 0x0) 05:58:48 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310118004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 05:58:48 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff}}) 05:58:48 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0x0) 05:58:48 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x0, 0x2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='pagemap\x00') accept4(r3, &(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000240)=0x80, 0x0) dup2(r0, 0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x82) sendfile(r1, r5, 0x0, 0x8400fffffffa) 05:58:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x29, 0x0, 0x0)