2020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000003f00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:50 executing program 1: io_uring_setup(0x79b9, &(0x7f0000000000)) 03:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000900000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000f9fdffff00002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:50 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) 03:52:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000fdfdffff00002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:50 executing program 1: r0 = msgget$private(0x0, 0x7b7) msgsnd(r0, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYBLOB="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", @ANYRESOCT, @ANYRESHEX, @ANYBLOB="5ecd4a39ecda0705ed0c2afe9f2fe6ab", @ANYRESDEC, @ANYRES64=r0, @ANYRES64], 0x8, 0x800) msgrcv(r0, &(0x7f0000000840)={0x0, ""/132}, 0x8c, 0x1, 0x800) [ 1100.664850][T12986] loop5: detected capacity change from 0 to 224 03:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000a00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:50 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) getpeername$inet6(r0, 0x0, 0x0) 03:52:50 executing program 2: poll(&(0x7f0000000180)=[{}], 0x1, 0x0) 03:52:50 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000004000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000b00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:50 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 03:52:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000007fffffff00002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:50 executing program 2: clock_gettime(0x0, &(0x7f0000000640)) 03:52:50 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x0) [ 1100.855650][T13020] loop5: detected capacity change from 0 to 224 03:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000c00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:50 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000004800000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:50 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 03:52:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000085ffffff00002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:50 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) fcntl$getflags(r0, 0x3) 03:52:50 executing program 0: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000580)=""/140) 03:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000d00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:50 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) poll(&(0x7f0000000180)=[{r0}, {}], 0x2, 0x1) [ 1101.024952][T13058] loop5: detected capacity change from 0 to 224 03:52:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000008cffffff00002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000e00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:50 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 03:52:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) 03:52:50 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000004c00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x40d) 03:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000f00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000daffffff00002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:50 executing program 0: mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x1810, 0xffffffffffffffff, 0x0) 03:52:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockname$unix(r0, 0x0, &(0x7f00000000c0)) 03:52:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0xfffffffffffffd26, 0x0, 0x0, 0x0) [ 1101.242778][T13101] loop5: detected capacity change from 0 to 224 03:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000001000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000e2ffffff00002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:50 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000026100000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000002c0)="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", 0xfffffffffffffd2b, 0x7, &(0x7f0000000100)=@abs={0x0, 0x0, 0x1}, 0xa) 03:52:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x800, &(0x7f0000000100), 0x4) 03:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000001100000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x800, 0x0, 0x0) 03:52:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000f0ffffff00002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1101.431000][T13143] loop5: detected capacity change from 0 to 224 [ 1101.452632][ C1] print_req_error: 460 callbacks suppressed [ 1101.452648][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1101.469427][ C1] buffer_io_error: 460 callbacks suppressed 03:52:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 03:52:50 executing program 0: clock_gettime(0x0, &(0x7f0000000200)) select(0x40, &(0x7f0000000140)={0x5}, 0x0, &(0x7f00000001c0), &(0x7f0000000240)) 03:52:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000001200000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1101.469437][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1101.542641][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1101.553537][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1101.572049][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1101.583005][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1101.596289][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1101.607170][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1101.615615][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1101.626528][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1101.634575][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1101.645433][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1101.653399][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1101.664270][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1101.672124][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1101.682990][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1101.691074][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1101.702024][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1101.709928][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1101.720785][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:52:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40) 03:52:51 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000f6ffffff00002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:51 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000026400000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_linger(r0, 0xffff, 0x80, 0x0, 0x0) 03:52:51 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x418, 0x0) 03:52:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000002000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score_adj\x00') read$char_usb(r0, 0x0, 0x2) 03:52:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000102000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:51 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setregid(r1, 0x0) 03:52:51 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000080)=0xc) getpgid(r1) [ 1102.220602][T13192] loop5: detected capacity change from 0 to 224 03:52:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000002200000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:51 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x3938700}, 0x0) 03:52:51 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000fbffffff00002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:51 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) 03:52:51 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000026500000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x3, 0x1}, 0x4) sendto$inet(r1, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 03:52:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000002500000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:51 executing program 0: socketpair(0xeb464d4b1453a6d3, 0x0, 0x0, &(0x7f0000000440)) 03:52:51 executing program 1: timer_create(0x3, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 03:52:51 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000feffffff00002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:51 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000006800000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:51 executing program 2: move_pages(0x0, 0x2, &(0x7f0000000040)=[&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil], 0x0, &(0x7f0000000080), 0x0) [ 1102.417379][T13241] loop5: detected capacity change from 0 to 224 03:52:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, 0x0, 0x0, 0x2060, 0x0) 03:52:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000003f00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:51 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000000020000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000080), 0x4) 03:52:51 executing program 1: socketpair(0xa, 0x2, 0x4, &(0x7f0000000000)) 03:52:52 executing program 0: socketpair(0x2, 0xa, 0x80000001, &(0x7f0000000040)) 03:52:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000005e831294000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000080)=0x1ff, 0x4) [ 1102.560059][T13272] loop5: detected capacity change from 0 to 224 03:52:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000004000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:52 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000000400)="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", 0x1000}], 0x0, 0x0) 03:52:52 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000016a00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000000000099d000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:52 executing program 1: waitid(0x2, 0x0, 0x0, 0x8, &(0x7f0000000080)) 03:52:52 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$P9_RCREATE(r0, 0x0, 0x0) 03:52:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000008004000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000002000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:52 executing program 0: semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000200)=""/117) 03:52:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 1102.751490][T13317] loop5: detected capacity change from 0 to 224 03:52:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x54, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x7e}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x54}}, 0x0) 03:52:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000003000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:52 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000006c00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000004800000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:52 executing program 0: socketpair(0x2, 0x2, 0x88, &(0x7f0000000000)) 03:52:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8903, 0x0) 03:52:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000004c00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000004000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1102.906253][T13351] loop5: detected capacity change from 0 to 224 03:52:52 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000007400000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000006000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000540)={0x14, 0x0, 0x4}, 0x14}}, 0x0) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 1103.046610][T13376] loop5: detected capacity change from 0 to 224 03:52:53 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x80108906, 0x0) 03:52:53 executing program 0: io_uring_setup(0x1ccb, &(0x7f0000000000)={0x0, 0x60f8, 0x8}) 03:52:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000005000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000026400000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:53 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000007a00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:53 executing program 2: timer_create(0x2, 0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{}, {0x0, r0+10000000}}, 0x0) 03:52:53 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={'U-'}, 0x16, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) 03:52:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000026500000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1103.755154][T13410] loop5: detected capacity change from 0 to 224 03:52:53 executing program 1: sendmsg$ETHTOOL_MSG_RINGS_GET(0xffffffffffffffff, 0x0, 0xa2558e21abf37af2) 03:52:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5421, &(0x7f0000001d40)) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}]}, 0x2c}}, 0x0) 03:52:53 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={'U-'}, 0x16, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), &(0x7f0000000280)={'U-'}, 0x16, 0x0) 03:52:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000006000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:53 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000029400000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:53 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000800)={0x0, @l2={0x1f, 0x0, @fixed}, @in={0x2, 0x0, @broadcast}, @ipx={0x4, 0x0, 0x0, "84b27cf3ad77"}}) 03:52:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000006800000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @remote}}) 03:52:53 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000080)) 03:52:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000007000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1103.967739][T13465] loop5: detected capacity change from 0 to 224 03:52:53 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) 03:52:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000006c00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000013c0)={&(0x7f0000000240), 0xc, &(0x7f0000001380)={&(0x7f0000001d80)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x34}}, 0x0) 03:52:53 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000019a00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:53 executing program 0: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x6000, 0x0) 03:52:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000008000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:53 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000002c0)) 03:52:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000027000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000009000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:53 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000018c0)='/sys/class/ata_device', 0x0, 0x0) write$tcp_mem(r0, 0x0, 0x0) [ 1104.154021][T13507] loop5: detected capacity change from 0 to 224 03:52:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c010000", @ANYRES16, @ANYBLOB="03"], 0x13c}}, 0x0) recvmsg(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000700)=""/218, 0xda}, {&(0x7f0000000800)=""/101, 0x65}], 0x3}, 0x10002) 03:52:53 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x8}, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) 03:52:53 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000019b00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000007400000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000a000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000003dc0)={0x10}, 0x10}, {&(0x7f00000000c0)={0x10}, 0x10}, {&(0x7f0000000240)={0x10}, 0x10}], 0x3}, 0x0) 03:52:53 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'ip6_vti0\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @dev, @local}}) 03:52:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000001480)={[{@sb, 0x48}]}) 03:52:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000b000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000007a00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1104.336952][T13541] loop5: detected capacity change from 0 to 224 03:52:53 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001100), 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x10000000) 03:52:53 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000019e00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000c000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:53 executing program 1: semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x6b6}], 0x1, &(0x7f0000000100)) 03:52:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000005c0)={'ip6gre0\x00', &(0x7f0000000540)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x700}}) 03:52:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000ffffffffffffff7f00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000000180)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x10, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xe80, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xe79, 0x4, "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"}]}]}, 0xec4}}, 0x0) 03:52:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000d000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)) 03:52:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 03:52:54 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000d5dc088300000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1104.568675][T13597] loop5: detected capacity change from 0 to 224 03:52:54 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)) 03:52:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000e000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:54 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000c0ed00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:54 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 03:52:54 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000008400000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:54 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 03:52:54 executing program 1: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000300)=""/172) 03:52:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000f000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1104.762472][T13648] loop5: detected capacity change from 0 to 224 03:52:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @dev}}) 03:52:54 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000ffffff8500000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:54 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000fffe00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:54 executing program 1: openat$vcsu(0xffffffffffffff9c, &(0x7f00000002c0), 0x2040, 0x0) 03:52:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000010000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:54 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000008800000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:54 executing program 0: setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x17b5) [ 1104.917166][T13681] loop5: detected capacity change from 0 to 224 03:52:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000011000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:54 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) 03:52:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}}, 0x0) 03:52:55 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000fff00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:55 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002500), 0x0, 0x0) sendmsg$GTP_CMD_NEWPDP(r0, 0x0, 0x0) 03:52:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000ffffff8c00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) 03:52:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000012000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:55 executing program 0: pipe2$9p(0x0, 0x88000) [ 1105.692322][T13731] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1105.706333][T13727] loop5: detected capacity change from 0 to 224 03:52:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c010000", @ANYRES16, @ANYBLOB="03"], 0x13c}}, 0x0) recvmsg(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {0x0}, {&(0x7f0000000800)=""/101, 0x65}], 0x3}, 0x0) 03:52:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000018f00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:55 executing program 1: select(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0xffffffffffffff59}, &(0x7f0000000100)={0x77359400}) 03:52:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000014000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:55 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000feff00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:55 executing program 0: mkdir(&(0x7f00000001c0)='.\x00', 0x0) 03:52:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000ffffff9700000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:55 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f00000005c0)) 03:52:55 executing program 0: timer_create(0x0, 0x0, &(0x7f00000002c0)) timer_settime(0x0, 0x0, &(0x7f0000000300), 0x0) 03:52:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000004e40)=0x8, 0x4) 03:52:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000018000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1105.913431][T13768] loop5: detected capacity change from 0 to 224 03:52:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000019a00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:55 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000004000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:55 executing program 2: prctl$PR_SET_MM(0x23, 0xb, &(0x7f0000bfd000/0x400000)=nil) 03:52:55 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000003a80)='ns/ipc\x00') setns(r0, 0x0) 03:52:55 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000340)={'sit0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @private0}}) 03:52:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000019000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000019b00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x894c, 0x0) 03:52:55 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x17800000, 0x2, 0xffffff9d}, 0x10) [ 1106.108438][T13810] loop5: detected capacity change from 0 to 224 03:52:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f0000007e40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}], 0x10}}], 0x1, 0x0) 03:52:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000022000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:55 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000008000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890d, 0x0) 03:52:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000ffffffda00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r0, &(0x7f0000000000)=@ethernet={0x0, @broadcast}, &(0x7f0000000080)=0x80) 03:52:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x2) 03:52:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000025000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:55 executing program 2: mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000, 0x2, &(0x7f0000ffb000/0x1000)=nil) 03:52:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000fffffff600000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1106.286400][T13848] loop5: detected capacity change from 0 to 224 03:52:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000002b40)={0x14, 0xa, 0x6, 0x5}, 0x14}}, 0x0) 03:52:55 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000c000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000002e000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:55 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x1a30c1, 0x0) 03:52:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 03:52:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r0, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 03:52:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000fffffdf900000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000040)=0x20, 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) 03:52:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000032000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1106.517443][T13892] loop5: detected capacity change from 0 to 224 [ 1106.546879][ C0] print_req_error: 370 callbacks suppressed [ 1106.546894][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 03:52:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89b1, &(0x7f00000000c0)={'sit0\x00', 0x0}) 03:52:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000007fc00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:56 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) [ 1106.563664][ C0] buffer_io_error: 370 callbacks suppressed [ 1106.563675][ C0] Buffer I/O error on dev loop4, logical block 0, async page read 03:52:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000048000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1106.656901][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1106.667799][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1106.686686][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1106.697594][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1106.708215][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1106.719087][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1106.727472][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1106.738370][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:52:56 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000ffff1f000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) 03:52:56 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) timerfd_gettime(r0, 0x0) 03:52:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 03:52:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000fffffdfd00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000004c000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1106.756716][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1106.767585][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1106.785365][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1106.796256][ C0] Buffer I/O error on dev loop4, logical block 0, async page read 03:52:56 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000001c0), 0x10) [ 1106.814611][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1106.825541][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1106.833455][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1106.844319][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:52:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000fffffffd00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1106.858872][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1106.869743][ C0] Buffer I/O error on dev loop4, logical block 0, async page read 03:52:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x800}, 0xc) 03:52:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000540), 0x4) 03:52:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000060000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:56 executing program 1: sched_rr_get_interval(0x0, &(0x7f00000021c0)) 03:52:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000240)) 03:52:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000540), 0x4) 03:52:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000068000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000fffffffe00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:56 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000040000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:56 executing program 1: syz_open_dev$vcsa(&(0x7f0000001240), 0x0, 0x14f602) [ 1107.009365][T13977] loop5: detected capacity change from 0 to 224 03:52:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000540), 0x4) 03:52:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8907, 0x0) 03:52:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000fffffffffffffffe00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:56 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @local}, @sco={0x1f, @fixed}, @l2={0x1f, 0x0, @fixed}}) [ 1107.131376][T14006] loop5: detected capacity change from 0 to 224 03:52:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000006c000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000540), 0x4) 03:52:56 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000010000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5452, &(0x7f0000000040)) 03:52:56 executing program 0: clock_gettime(0x1, &(0x7f0000000140)) 03:52:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000fff00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000074000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:56 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x109200, 0x0) [ 1107.315164][T14039] loop5: detected capacity change from 0 to 224 03:52:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000740)=0x2, 0x4) 03:52:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x8910, &(0x7f00000000c0)={'sit0\x00', 0x0}) 03:52:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000fffff7ff00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:56 executing program 2: semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x6b6}], 0x1, 0x0) 03:52:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000007a000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:56 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000020000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}], 0x40}, 0x0) 03:52:56 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x40082, 0x0) write$P9_RCREATE(r0, 0x0, 0x0) 03:52:56 executing program 0: prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000fef000/0x10000)=nil) 03:52:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000fffffbff00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000062010000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1107.516477][T14076] loop5: detected capacity change from 0 to 224 03:52:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0x15, 0x4) 03:52:57 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000004020000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000007fffffff00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xe}, 0x14}}, 0x0) 03:52:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 03:52:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000069010000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={0x0}}, 0x0) 03:52:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f0000007e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 03:52:57 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/vmcoreinfo', 0x0, 0x0) 03:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000ffffffff00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1107.725246][T14123] loop5: detected capacity change from 0 to 224 03:52:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000008c010000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r0, &(0x7f00000008c0)=[{{&(0x7f0000000000)=@nfc, 0x80, 0x0}}], 0x1, 0x0) 03:52:57 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000030000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000007ffffffffffff00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000000)=0x4, 0x4) 03:52:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0xc0045878, 0x0) 03:52:57 executing program 2: syz_mount_image$ext4(&(0x7f0000001e40)='ext3\x00', &(0x7f0000001e80)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x1000, &(0x7f0000002580)) 03:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000007fffffffffffffff00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000008d010000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1107.901944][T14166] loop5: detected capacity change from 0 to 224 03:52:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000001d80)={0x14, r1, 0x1}, 0x14}}, 0x0) 03:52:57 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000040000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000feffffffffffffff00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="700000000301010800000000000000000c00000508000c40000000011c0018"], 0x70}}, 0x0) 03:52:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000000), 0x4) 03:52:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x0, &(0x7f0000000740), 0x4) 03:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000ffffffffffffffff00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000092010000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:57 executing program 1: getresuid(&(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280)) [ 1108.064980][T14202] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1108.080314][T14205] loop5: detected capacity change from 0 to 224 03:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000200000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:57 executing program 0: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x0, 0x989680}) get_mempolicy(&(0x7f0000000100), 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x2) 03:52:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x85e, 0x4) 03:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000300000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:57 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000050000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000093010000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:57 executing program 1: mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x5, 0xffffffffffffffff) 03:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000400000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000440)=""/162, &(0x7f0000000500)=0xa2) 03:52:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c010000", @ANYRES16=r1, @ANYBLOB="030127bd7000fddbdf250f00000064000180140002006261746164765f736c6176655f310000140002006c6f000000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002007866726d3000000000000000000000001400020069703665727370616e30000000530bfdf4000100", @ANYBLOB], 0x13c}}, 0x0) 03:52:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000096010000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000500000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x40}, 0x1, 0x0, 0xf0}, 0x0) 03:52:57 executing program 2: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, r1+60000000}}, &(0x7f0000000100)) [ 1108.309615][T14254] loop5: detected capacity change from 0 to 224 [ 1108.326718][T14260] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:57 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000060000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000600000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000097010000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1108.392779][T14279] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3c0000000202010100000000006cf5b4a2389c550e000840000000030e0006006674702d32"], 0x3c}}, 0x0) 03:52:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x8930, &(0x7f00000000c0)={'sit0\x00', 0x0}) 03:52:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000001640)={0x8, 'veth0_to_bond\x00', {'vlan0\x00'}}) [ 1108.466417][T14290] loop5: detected capacity change from 0 to 224 03:52:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000700000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000009a010000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:58 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000004060000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1108.520903][T14307] netlink: 'syz-executor.1': attribute type 8 has an invalid length. [ 1108.529060][T14307] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 03:52:58 executing program 2: socketpair(0x11, 0x0, 0x1f, &(0x7f0000000000)) 03:52:58 executing program 0: socketpair(0x25, 0x3, 0x0, &(0x7f0000000140)) 03:52:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:58 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/block', 0x17fb00, 0x0) 03:52:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000000980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2060, 0x0) [ 1108.628589][T14327] loop5: detected capacity change from 0 to 224 03:52:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000009b010000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:58 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000070000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000900000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:58 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x0) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40810ffe) 03:52:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8904, &(0x7f0000001d40)) 03:52:58 executing program 0: pselect6(0x40, &(0x7f0000000500)={0x1}, 0x0, 0x0, 0x0, 0x0) 03:52:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000a0010000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1108.793002][T14359] loop5: detected capacity change from 0 to 224 03:52:58 executing program 2: pselect6(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x2]}, 0x8}) 03:52:58 executing program 0: semop(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1) 03:52:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000a00000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:58 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000080000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:58 executing program 1: waitid(0xcc, 0x0, 0x0, 0x8, 0x0) 03:52:58 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000018c0)='/sys/class/ata_device', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 03:52:58 executing program 0: socketpair(0x0, 0xd, 0x0, &(0x7f0000000000)) 03:52:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000a1010000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000013c0)={&(0x7f0000000240), 0xc, &(0x7f0000001380)={&(0x7f0000001d80)={0x30, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x10, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x30}}, 0x0) 03:52:58 executing program 2: sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0xbfe34938c1c8094f) [ 1108.963604][T14398] loop5: detected capacity change from 0 to 224 03:52:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000b00000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:58 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x200000) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) 03:52:58 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000090000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000a8010000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:58 executing program 1: mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) 03:52:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000005c0)={'ip6gre0\x00', 0x0}) 03:52:58 executing program 0: mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 03:52:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000c00000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000a9010000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5452, &(0x7f0000001d40)) [ 1109.168982][T14445] loop5: detected capacity change from 0 to 224 03:52:58 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000a0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:58 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 03:52:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000004020000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:58 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/113, 0x71, 0x20, 0x0, 0x0) 03:52:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000d00000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8910, &(0x7f0000001d40)) 03:52:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r0, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000002c0)="48779db106e5b6f7543117e721b4395dcfda7aa107e8f1341419dd18fbff1b6a7a18584c1fdc282114a8668615a5042475c187d05845443766cb77e81b2edab16bcfe7db27cc4e89e1291c9697279b0428788e34e33cdaba74ef93edce944142cb8b92d7d2e62cb5875798dbe08e629d296eed2968ea8cb9f205f478c5b7e653de34e159d4dbcbef379fda984b0fffba285aad694d874d9684c5c3063c67bb27fad71d3fde8fd8b39e8ad6", 0xab}, {&(0x7f0000000380)="5dabd393d8a0d99cdff5b9a55f4d315b0434ee29475274021d07480d18c29ad5e1c8c220aeaf035759df1a10d526b254253223832c887d4ccb78f770ace906382808bb8fd2936b15451486c207e915c2e09e29b798247e11dcc95bec9037f0eeabae8e0e21b283099289190b5840b392e7e91e8a4813ddd1791cb9d1f4252e5c347839", 0x83}, {&(0x7f0000000440)="585ba1a30cbce12db346f6d49d2f0aa45a4907749a42ea556404312d9d3de2be8568c9c6d3447298d88e70e7c80292d8364f1236c7b20ade2e6bfc40bec50e840861127bd184e301b0942bc83bf5eff2c91ac566c5267974029b9eb2c20c176f4a8fa4155b5289fd865b6f39425e6c9d168f8124b9bb7def468b7c65e082d8434fc2050daebcf328789525bfc1c4886a4034d4ac6a168a2ef083416423d809de49e72b484e8c550397d7129eb61c507bac32d34e", 0xb4}], 0xa, &(0x7f0000000540)=[{0x20, 0x0, 0x0, "7dcdfecd9486695316b2255d"}, {0xc8, 0x0, 0x0, "93fe77f5a5a562cc0cd70abbf4d7686481ced6fffd246c5bd4748562ada8b495420815d254ea11464488ccacf474ff6ea49d810fa77ef98187cb0bed8392da23a4f72c16aeaa027c58c76180bcbbea77951738af7aa43beee8a33c5f1ef8ea2b944d12ec3fc142a49ac02883264fa5cb05de49d6775917112e6031822623380bf8a7b4b8a089c3c548380d512b313d0f95a2dc4c0a82a9e73f3c9819863e78e92124215f98b2d1934fd9f149f6144ca84b8387"}], 0xe8}}], 0x1, 0x4000) [ 1109.322667][T14484] loop5: detected capacity change from 0 to 224 03:52:58 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000b0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000047020000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000e00000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:58 executing program 2: select(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)={0x0, 0x2710}) 03:52:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x40}, 0x1, 0x0, 0xb017}, 0x0) [ 1109.464781][T14512] loop5: detected capacity change from 0 to 224 03:52:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[], 0x64}}, 0x0) 03:52:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000056020000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000f00000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x89a1, 0x0) 03:52:59 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000c0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:59 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x450500) 03:52:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000057020000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000001000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:59 executing program 2: r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x810, 0xffffffffffffffff, 0x8000000) syz_io_uring_setup(0x559e, &(0x7f0000000740)={0x0, 0xb1, 0x1, 0x3, 0x160}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000007c0), &(0x7f0000000800)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000b40)=@IORING_OP_SENDMSG={0x9, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)={&(0x7f0000000840)=@rxrpc=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e21, @broadcast}}, 0x80, &(0x7f0000000900)=[{&(0x7f00000008c0)="cd6c8a8389d4da77985cc02b355555c08a4dc2904352a584ad29bcbf", 0x1c}], 0x1, &(0x7f0000000940)=[{0xa0, 0x104, 0x0, "601d11ca5c692ea6a6da793c18e8c6c3112a076b2b87a978dc6bdbd711e406f8d16991172e69e353fbe82fa6b0138fa007553719b338bd8bcd88d985107e13a2b1d9344f9e5b1011fa2f3644231a6c799e7c25f3d7ff5404cf820b7d7dbc84e23a2658bcb7b87fc5d9316e0fa26b459ece510d11c277d87721b448248d2e160b0b8ad44b514905cc53"}, {0xb8, 0x104, 0xff, "bc2e876046e86f462a18b06765995de3dfc9cd40467a46408b939c9b44ffca37c3bf7540391225f34a9091f4c51310d62ec6757f80aed640d1f5430bf8f9654fdc1c5e6a63899ecc97758be111d5d62ed252d88589130a361146f77b7df4ed2dbb920f678733188fdf8c426c0c9c94873b7c24b4370cd8cdce35504b70df2009b805367cc62ba0a7ed37861416842fe6a327b6ea17f164eee5803c0dd4bd0302026219"}, {0x18, 0x110, 0x1, "46be131dfc5aa44c"}, {0x50, 0x29, 0x7, "065c3a3dacd56e3b38a2ac17fe27b165de26fe7cbd8f80fc8bdcb85d3df43946c12b52b8bde434a6d9c25e6dbb61f09fba28b40c0df7645ef1dfe972"}], 0x1c0}, 0x0, 0x4000014, 0x1}, 0xb2c) syz_io_uring_submit(r0, r1, &(0x7f0000000b80)=@IORING_OP_FSYNC={0x3, 0x4, 0x0, @fd_index=0xa}, 0x8) sendmmsg(0xffffffffffffffff, &(0x7f0000007a40)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000bc0)="c28606c902ff7f607397692a8720c0b8c5f489e4d2d422920019bfc1cfc0ac53175513b3c363459a5d5557339053ff0f34b8d1385139700a4cb30fb13a73eccbdb86424068432912c38c5024aa60ca174202e75e4f587b83e92acc79a38c31800c616a33b11a7ad9a63503e11825128723fe66bd410692dced889fdbe7986792e192d58ac6cf0b68b0a57e4da1ed8be5ba696366c3f27aa4d878b48295e77d75dc05819a4c4fac2f2e142bac1925ee2f1daf", 0xb2}, {&(0x7f0000000c80)="e1e8c23da686b259026a11c3c957b073866bbd4a5a6b85b8525ef1286057153bd3e9a5179edab40a91653cee977426aadaeb2c24a64fac919e33d271d4be73ce07e924e8351dd387a9218d2547c509f81eec09d7d3492e2848ce5f3d5522a10d02c9b624320caa649945b30356857eaae5e4f8c1c68f3e427e97ec240d981eabbcc895777ab4c19719f1cca6aa43b34926109fdc9e8c953b4d7e22dc227ebdbe5c3056ce559bb7acdd7959f6ce44536bebec02bf654e80b1af65fe4e41b1b5a3903b8391ab6b7fa743c6b9745b857bd3c5357980143e8af3d8fd557861cee2", 0xdf}, {&(0x7f0000000d80)="0e6b12be9cc513abdfa35cf9366e09b18dc2d4d258ceac3fb855af988a4ac98bb38b6951d882886026d2c9c6364c9147c6e93c224442dafff6ed7c2695a5adcd2de89c132969ecf938b486cd12772c72a4cecbabe8ac6ff0571bd70a8e833aadef46d6913e569da07690f9377b68ba453ba6cb0c14c01ab065029b94f3b8feb0c7af835a2d7d7704e818843fe879f0a28f19b68956eb1259c71b1e758a1f84c0857b1a469ed549f3c88d415a44222de8cf2beabb7573de1420e1483cc8416f1e1a1bca80591d5aff40a9e3eb80bc3dbca4ee", 0xd2}], 0x3, &(0x7f0000000ec0)=[{0xa0, 0xff, 0x3, "7eec1c7e271e415d027c5361f57518e82b98d9e9defcd3a753fb714693d6b444d0812c90c678fddfa4d8dcbaa137268897959abb3768fc8f2aede28aba488eea8c9ab88e4e75e5ff2d4c19bfe24aa5c5a231e88e4a6afe940f84253886083cdf6e344f881709dda96ce188c206ed64b1167ed367eab416f4d1b3a218ec9104f1d14b1c824d41cf29e4cd5c9c72"}, {0x1010, 0x111, 0xffffffff, "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"}, {0xe0, 0x117, 0x10001, "e14c0e3c876e9a6d1ffbce48b1ebec621e08533ac11f80c0291b0b9bb465981f0fe7aee9df809993165091028a1d8b66dafbeb4482851c9cd68e2549261c3cff270870a3df6c61fad635c9e4f9d83fd4a3ee6ce9939f088bdbdc25c5704d3c85c47f980f6147a06ac9feb61b8e57242ce917d4bbb6f30881bc9b333fff1279e363741b342214328bbf488ac98da73c5b14464ea8d5ecb61e9f041f9884474d7dcf86d238b027ee642d23c2944b1c526485cdf4b8aa46902e4ccb5762ffe45f985f8b680fd9aa1962f7fe"}, {0xc8, 0x102, 0xca1, "a2b8687c37398cea834890015cf4b1a90c16bf8f7ad919850b31c65e86bf23d86dfc6dc4b5b5e0ecf8e28a62c60a68a1fbf98b6bcd4dc8d636ca8ce843780499100ad67813e6ef0a796aeab4055882691b810551a1de8d19e0a78df3be8fd84e3e00f1aa26b2bfd7d888d2554d085c896798fbdc68f6c5f1fedc3bde260d154de05a2151ba3c184b54d735a118c026d285f93ae79dd014241264a783be9ae59ef7fb816715a15fb6249d3feaa26973f58338a3c5b304"}], 0x1258}}, {{&(0x7f0000002140)=@l2={0x1f, 0x9, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x2, 0x1}, 0x80, &(0x7f0000002440)=[{&(0x7f00000021c0)="0d3c2d04e54db603f660f6693ba246d07be2e418b00a5da96ca06e2737e2944dcb78bac2aeaf", 0x26}, {&(0x7f0000002200)="18eca2c0ff667235a88ba132be2304fe7b42baa6b2db94879956694bd9847e963fdac17b6056c735fe8910e1ab83f87535a466ffc8984d4681bdb2a6c4239a0ff80e541bc3e74b83b7b8881b86731bc026d7082095a6c2187bb2fb0b3e8ce2ee", 0x60}, {&(0x7f0000002280)="dbd0a80bd321b13b23245dc44b79cd8d24bcdff2d8a5c2a22e69e8ba18fcdca06c2cf2d9b9e43aa18790d24aeb776594a7826ddc296a03a6287a695d2b70623741e7fca005d59b02693333f91390623e3479b5478c84f2332cc5912089846d28850fcb115eedebcf4168e29f33a98e513e11b4cdb5296c5ea1233fd93205ffddd4db135d4cd2ac7a406a11359c06c23d0aa66b448796713c3cddf4747d27576230b89e30", 0xa4}, {&(0x7f0000002340)="cd3c921395ff953a00d44cbfaffdfe3632dd8ed26a53a6512e70c551e0b3201e9db6c9a90a51cff001b0df8d7989ca49a562453050ec2ddfeaf72d1463a5a981a2113f24ae021fd2b96e7dbbe61cf44195605592ec17201d4ebec24e0f3e50b53ee68e871de34a8d5e4ee7e6679a4efacbc12e562322d1", 0x77}, {&(0x7f00000023c0)="92b84db78e5ba28e274b721cde06444268267d4587320378bd5a5f332eef6a2db88d43543c50f3b1a2e5541130c8e4a15d6801f2a6b4291c49dac1edd2203b8c7279a6f1b336b20a054d6475d68dc9b1eda8c6eec6e4b1c03f441d7e59b6a39e1e6cd51f70", 0x65}], 0x5, &(0x7f00000024c0)=[{0xe8, 0x119, 0x6, "4d44e9a3c09e53cfb9b85aa0a8db01a2edab9d38d0f3617a345f2091ca57b3f042f5330fdf88d3541844e47251dd6d380422836185cfc955edd69172a166f1ec5f1de02403ea6ccca06b47392ca4f6b0085c6ee3f9b0c0ef9cf05a5516cc8b7ae0db606c2f51322385c7efc193b8d5f0f08fa8957453845a91675adbc3009a56d6a994b900186a0d1d5cbe0c08bfa4af1c65235edb764426cb59c63838b9fee0ffcf74400267b2c15a6a2b33210829b3aa35fe0f4d8aebd91a860a360f00d47aa6bf06385c323d85d3edbfd5a3b449683c23a3e2d7"}, {0x80, 0x104, 0x2, "64524bb455651bf3bf65605177faf6a3c662ab29686b41938a2f94e3ee5e260bfb953f23178fff125426e5dd83070dabfada23dfec0cf3d24de34a1b98d52190482f719ed06495848204b8cd4816da23c54f30e10351476a7387c2d235b063923bee2d8fe103a80ea388f3d5"}, {0x78, 0x114, 0x5, "6dfca168a72d8443d30f3b389fcdaa20d6a4356dc447bd86cf6abbfbeb532da8c164c8231b02f096e07784eeefc6db730226efad37b9894c88527a09f6c73270cac1755eed4dc0bde84c1e39e7afc9c121a69413f938b12f66ce6185a8501652418b60c479"}, {0xb8, 0x100, 0xffffffff, "1dd8f03aa358f4d14ee3b8f674441eeab95a681d7b1e248b9bb1038a1d6fa306a39e30f875abc6d8afba1be0a756e48c6665db446795b9621c210ce9dd2ce0289bf3bd5e844e1c16b34f4fd19017c832e4666557adc2246576adec80d7090856ce933ab56a5624479b3739e2a750db69e3e8f7da4697fa0383e9b4151492c4908c88f1e07876d3cfcf675a5f94148afaa3831ed3b9fc1e9f52c89221d489f9b93db55a"}, {0x10, 0x84, 0x1}, {0xd0, 0x10f, 0x7fffffff, "adb12ffb33b57c157d0c078d54ce03187ca771514baa3c5814c63eaa5bef3d74b197ea1bca1cdc9662e1a6277a64b498557ba7cba97a811043856d4e4f7dbbe1ae3de615806884651128b43bd09d7790b5a07934eae7f4fdae404a1667598e28248d4db0755d89f7d7b7272a84ddc93ab81626e9f8e5e72d6ff7f630ad65c4b8af899020a9be964ec0d00778899ee316c6570af82bb7cc02b679c895944ef090590e5609ec4906b7b854252d51776ecdb2d09063af578364f4cef516af4d90ac"}, {0x68, 0x88, 0x101, "408d9ecae595dd7e7fd4581bbc1cd5ced79cdfcb65a77e7624139d4eca69fb56c109ca9a2ceb720de17dcb0620ff755b1df7f18da46e85a63c332204559162d66ced37ff0fdd92324c7b20f09d3fde3c3e"}, {0xf0, 0x88, 0xff, "079cadf0d8698cace361458138197eff090e2a6a4d74efd1f54952eb801eb67e08cd2ad51fe877dc9a9113bd41cc4c882c2ba4d1b015fc7ea46654a7ed0de4abe6f9d362efac09321b547f203f1fff56c505e7e76c2ae8739fc6f0aa198c7c406830a7601433263e58daa773ea4af7133a0dec1a2862f3e665ce9e68cfd4a4f3f11d2189669cd44950839b28d7036020d6d04351dc121fd03deeff06b6fa2194ec43a1dc87fd4bc8cd2a451d99d134048db0df0ba2a9bfd7cf73095ea8704bd91aa123eaed502e1b3738953f56f804b42116bd7b267f7786adc37b16384c5e40"}], 0x4d0}}, {{&(0x7f00000029c0)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast]}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002a40)="08a8e27db854100e88c799663e4bde50973cfeb3c098cb902a321fcdb8eb3e3a76ced8c251e48bafc271d6a6cde7f06dd1f74b0b5edf3f0fdf95280b96c5c93a574a598fb97f72d4c991a3f0f6b1fee44621aaea9054c39f645ea11c361f9cfdd681e0fcec7f4b9b0580631b6a6f6a2c2ad002aeb780251bf5e264246d5a0ff74f5b1fc775dd8a92b917945f99b9865dcc83e53e07847a188ec0619701f8f8b2cfda18470054211a16ca36f727e6e4eee36a198b1df106a040acd458eed403b3e892040c05397deeb97017e1c79ec12baa26c5a1af3572db7eaa3d7140", 0xdd}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000005880)=[{0x10}, {0x10}, {0x10, 0x0, 0x80e}, {0x58, 0x0, 0x4f, "1939c0f82376af57b76874d1f468270957b5f90094d3473b17567ccbe58a3c3b07b633ebb7b8d250ea6690b5ff562e993e4f90ef4368601b4cf6af761bb01d182c51f1f4eabb5db4"}, {0x110, 0x13e, 0x4, "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"}, {0x40, 0x0, 0xfffffffe, "58c555b5241fe65d0faf8f692d5479f52a2b70c251b9c38757e279ecaf454226c5a13a803d1e0466b374496c59a93d9e"}], 0x1d8}}, {{&(0x7f0000006d00)=@can, 0x80, &(0x7f0000007100)=[{&(0x7f0000006d80)="15a8666675c79bbb481ec8937deba9cd3db018f51de60cc8af705b2a5eaa385106310a1483d4a3320621537d2dab8ee071ac9d069b01bf49ed7c575a180e26230a70e0be097084a9447a964bf1a0a5047ec44178ff4245447798eee3aacd5fff0c6473326f59c69add40ad23515ebb957c3d8b3516673e7205bac75e3e6b6b61deaa403941c268ed3e71ddbd4e20df1dadb185e017ec083d6ed39826691f55", 0x9f}, {&(0x7f0000006e40)="07d224c30096838f1cfc349904b14d25695fb5236c36f35a6606a9b9e0a2abd395020d2dc8bbba1e4864b088e05c1f5d96f87731741400ba961a50d23329e4ed1cbcf73ecdd6d3406f49e61ffb866630cab6db8f8df8f6ee6bfe99852185325e0351693c2d3e24d1f173941317f93d2c5ade3f40793a4cd31c1bea800d54cbc9a767b2c4207aada8c032f89d01b9fea1123dad9c27b17b7bc906a6b2a38de03d590c4c706487f4bc04c5be52bfd03ffa830c6bf33893bc4add95f2915f5d87ad26fc175c61d7a8f9bb8f843b93f55520cfb17eb32e94a3e86dff9f4f8acf2e3df4ffb95af1917cee5378c66b457b369b9679b7cd4acb", 0xf6}, {&(0x7f0000006f40)="f4b0f30091fbef36cd1a2d20a588cefbd3ddb2a768e279decad7b86c6a8a639e20e98aa89504c8c328f4d45c241a9e649ccbe91c4e", 0x35}, {&(0x7f0000006f80)="1f09e13379a053f6b9eb17ce1c100b0c5bf75dea4dab92506d35cbbcac65d087a381860b290818bc35fcac06913bc78fbe8ad333576eb82fc4c4ef3b45a518bc1301f8a55a929dc61c9e04d668b301b3b1c1b92c287f8ff9e2bd25014a72d0305adbfb307a23eb464bdc9f8d7585c05f202a", 0x72}, {&(0x7f0000007000)="899e10e92378a42193fb57c940c81280d3ee878bcfb5f2d578a660f9d406ae81b285dd5a809b5f9c0d9fa344e32324104703241a39bd8d99265f34528522e634b5f6669aab2e2ffc7ccb44900079a3de0ed3496c86ec8f4feb175aa0ea3c768f469679279455f87f553d67350f5f72973e77b2a6a13db1b3cd56ab4e239e5349ab3886f07fa51f25d390feda90334762dfe1fda308374afbf8cc76b3e172cf71ea7d1145dacb357ccd95ec2447009b592144b8ba8c8b5dfda26da3ac66811c8fb92515f0cf015d53b6a42744e2f60927b2d5bed87ea592", 0xd7}], 0x5, &(0x7f0000007180)=[{0x90, 0x1, 0x80, "60f5c64af92be335cd2de315aa4ab4f04ee5388e8c2799a9d204bb93342d6ad726f4a54f763bb0b8de0ec6f59daa6f44fed780964dc0066d063752c5611b9ee7ae2f01d284a0394d40fb54cea0c8db8eef2a66b5065508039dd2b808361cb83b768b3b399ce1efadd362b07ffc0c4c4fbb0f3ad5d890006401979b139807be"}, {0xe0, 0x118, 0x9, "32d9232b6cb8f4b3802c7c397f9271371a90f90637e2343206d49c072a015232f6321838263f0a754e62c78fb83481c4c3513359c30f4db281978f462d802b3ecf9f1f71c139db5c306b0462075167a523271d17966c33f3407680377b65d3eca7f25745ff7a7796621b7acd1c193f1b23c6177189c19bf31e248b5a24ab744353b47095ed8f739b7001d3a5f188ce8379bf3383df15709cb3b6c0320daea5d3db1d77c931da716961bb340e010ee4104dc6f5ba629aab89a3ef3caa4fb9abc899d418e1002074506230b584455966"}, {0x20, 0x107, 0x157, "e251387ec1bdff5312bc45b0fc4b9a59"}, {0x80, 0x107, 0x8a, "4f0b919f185813e5d486239e68bcb01b3575aa68f7cc42a482b7b77eac081791c01fcfc01da2b6817e1eb41440f46fce586508ef8d4ce886e8ec98b3e3556e06f21aa7579031d85fd3979a9fe0af9e9d9e98f1303169f6ba846619460517325ab26ed3397267c4ffe49bdac4b8d31ee7"}], 0x210}}, {{&(0x7f00000073c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x3, 0x1, 0x3, {0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xfffffffe}}}, 0x80, &(0x7f0000007680)=[{&(0x7f0000007440)="67983238c42006e379f0f7170bc22285cd38072c92a2de0a06eb186d0c4274d690877f806916ac2ae0687a279359d5349865", 0x32}, {&(0x7f0000007480)="11f187beaa8c243d3955f12dbeeae239554bc2d50a80a6154b529e6bd86483c8f1e65952a5865f4a379ae73f3d506be01d08f94ba2450c3ef950587f593af842f7762625c82040893a8654d1cc7b6bfb0a9102eade3a204a3767e9a50032107e40c7f23758f43370fbe630a15e266c6de80ebbb7c454392994a79286fff9cab2862fa852cce39edf8fdea111a6ed0624bb5d9e4cd0ac4baf4eb0179f86cf1ae7003182d28ade1423f22d5f87c9c7738d2d7c31c8bf66d54a854c4287ef4a15f55c6d", 0xc2}, {&(0x7f0000007580)="5497474fc2d50e5a435eb3e4bf58d4d16c7b7127e44632e110c89be09ad3ff922f133bd2d9930f8fd3fa4ab62d382fb2605cc1c0b209c41ffb1af16aea511b6936fda1528c5814aed5", 0x49}, {&(0x7f0000007600)="d123956c4f5fff5ab01e22072f5343f58a5ac3e4ee90f3db400c000683ee27b82d90a80c514ef81f507ce85fb2a0ce10d38c3fa408bbccc94701b76d36135a3d8e870877019f024639d9668d112b6746a4ebc9b2e5bf7d4cf8d0092af2a36089d2660b906cda08f61e85995e0f42a2e29277b38307f8bbe1", 0x78}], 0x4}}, {{&(0x7f00000076c0)=@sco, 0x80, &(0x7f0000007900)=[{&(0x7f0000007740)="f583651cfd44f2e10615bc5e8ac44d2b99b933349be764fbf4f5d60d02a7891203623ee7ba8ccd3f37686512251fac6231b52159b09f93489f21a4c8632fa7db5c0e537ce229868ee1782a1f4a068eb3ed8a881351a02c0bd77bad328dfaf0304ff2d10d4196940ed09b6ae735516c73c62d4589928668797de3eb84f758e13e0d8d5ea25fca7a687e21442a11d23ebc243784ecff8d18b75540f37349d8044bbbfcfa5315610e440732169106c3347cc1795d906df6e00367df1cb77a3ab4f4bacc9c14a2", 0xc5}, {&(0x7f0000007840)="05a9f8254bc54d31949c3fd95738679751704b81b3097af64a58fa0bcfea64a86eaeba9446e2250b91f0b712a2de5dc2e9caef5faadcde19f89045f10c3acb7f7987598202f77cb8e6360c9fa35116be5d7110c6f08caf2b66b9046a9b858c642e057316d4f4", 0x66}, {&(0x7f00000078c0)}], 0x3, &(0x7f0000007940)=[{0xc8, 0x88, 0x3, "6bdfb5014325934269d32bf70b8273bffbede35a843a2d7ce89de67de8535f5f3939d7c4693fb2dbf263ad640fcc7a0e6316c33ba01d5dd54428976367192bda9b78cbd6d40d58c393d947f15f4d2b93a5d5ad6535d8d5abddd528ea69a61028a0a9abd045bff9c81edbd30e1cd8977bce37cc2da9709e18027dcdbf3ef2e6dc1d3a1e4377baffff82d087a1cc561d2bb86deea1fa128d3cf19971f76f5aba81f49b998a765b6fc6a4b4400c0dcd5fe5da4bd64bdbeb6a"}], 0xc8}}], 0x7, 0x40010) 03:52:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000001100000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:59 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x4b0002) 03:52:59 executing program 1: semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1800}], 0x1) [ 1110.231110][T14558] loop5: detected capacity change from 0 to 224 03:52:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000005e020000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:52:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xa, 0x0, &(0x7f0000000500)) 03:52:59 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000d0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000100)={'sit0\x00', 0x0}) 03:52:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x24, 0x2, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_HELP_NAME={0xf, 0x6, 'netbios-ns\x00'}]}, 0x24}}, 0x0) 03:52:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000001200)) 03:52:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000001200000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000005f020000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1110.376181][T14590] loop5: detected capacity change from 0 to 224 03:52:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000280)=0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) 03:52:59 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000e0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:59 executing program 2: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000002380)={{0x3, 0xffffffffffffffff, 0x0, 0xee01}}) 03:52:59 executing program 0: syz_mount_image$ext4(&(0x7f0000001e40)='ext3\x00', &(0x7f0000001e80)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x0, &(0x7f0000002580)={[{@errors_remount}], [{@fowner_gt}]}) 03:52:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000002200000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:52:59 executing program 1: r0 = getpgid(0x0) waitid(0x1, r0, 0x0, 0x2, 0x0) 03:52:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f00000000c0)={0x8, 'vlan1\x00', {'geneve0\x00'}}) 03:53:00 executing program 2: clock_getres(0x0, &(0x7f0000007e80)) 03:53:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000064020000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1110.540357][T14628] loop5: detected capacity change from 0 to 224 03:53:00 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000002500000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:00 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req3={0x0, 0x0, 0x0, 0x3ff}, 0x1c) 03:53:00 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000f0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000065020000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x3, 0x4) 03:53:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8901, 0x0) 03:53:00 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000004800000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:00 executing program 0: r0 = fork() move_pages(r0, 0x2, &(0x7f0000000040)=[&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil], 0x0, &(0x7f0000000080), 0x0) 03:53:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000068020000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) [ 1110.757960][T14689] loop5: detected capacity change from 0 to 224 03:53:00 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000100000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000013c0)={&(0x7f0000000240), 0xc, &(0x7f0000001380)={&(0x7f0000001d80)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x3c}}, 0x0) 03:53:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5452, &(0x7f0000001d40)) syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r0) 03:53:00 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000004c00000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000069020000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:00 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000006000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1110.912661][T14728] loop5: detected capacity change from 0 to 224 03:53:00 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000110000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:00 executing program 0: select(0x40, &(0x7f0000000000)={0x6}, 0x0, 0x0, &(0x7f0000000100)) 03:53:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000006c020000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 03:53:00 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000006800000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1111.094554][T14769] loop5: detected capacity change from 0 to 224 03:53:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000005c0)={'tunl0\x00', &(0x7f0000000500)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 03:53:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000600)={&(0x7f0000000000)=@caif=@util, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/221, 0xdd}, {&(0x7f0000000180)=""/82, 0x7fffef23}, {&(0x7f0000000200)=""/145, 0x91}], 0x5e, &(0x7f0000000300)=""/221, 0xdd}, 0x0) 03:53:01 executing program 0: pselect6(0x40, &(0x7f0000000500)={0x1}, 0x0, 0x0, &(0x7f00000005c0)={0x0, 0x989680}, 0x0) 03:53:01 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000006d020000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:01 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000006c00000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:01 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000120000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:01 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000072020000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000600)={&(0x7f0000000000)=@caif=@util, 0x8f, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/206, 0xce}, {&(0x7f0000000180)=""/72, 0x52}, {&(0x7f0000000200)=""/145, 0x91}], 0x3, &(0x7f0000000300)=""/221, 0xdd}, 0x0) [ 1111.724073][T14793] loop5: detected capacity change from 0 to 224 03:53:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvmsg(r0, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000002180)=[{&(0x7f0000000080)=""/4096, 0x1000}], 0x1}, 0x0) 03:53:01 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000180000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:01 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000007400000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1111.789127][ C1] print_req_error: 490 callbacks suppressed [ 1111.789147][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1111.805922][ C1] buffer_io_error: 490 callbacks suppressed [ 1111.805931][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1111.865639][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1111.876543][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1111.890895][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1111.901771][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:01 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000073020000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1111.910798][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1111.916539][T14820] loop5: detected capacity change from 0 to 224 [ 1111.921667][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1111.949191][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 03:53:01 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000007a00000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1111.960059][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1111.980795][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1111.991662][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1112.000517][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1112.011420][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1112.022164][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1112.033056][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1112.052513][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1112.063424][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1112.072341][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1112.083184][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000700), r0) 03:53:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000008400000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000096020000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:02 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000190000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000008800000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1112.606715][T14849] loop5: detected capacity change from 0 to 224 03:53:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000009c020000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bridge_slave_0\x00', &(0x7f0000000000)=@ethtool_sset_info={0x37, 0x0, 0x8e}}) 03:53:02 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000010200000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fddbdf00030000c1000000000000005afb83e29a03578d35678413ec8e221c711593589389be"], 0x1c}, 0x1, 0x0, 0x0, 0x4080}, 0x40) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000012c0)={@rand_addr, @remote, 0x0}, &(0x7f0000001300)=0xc) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001440)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001400)={&(0x7f0000001340)={0x58, 0x0, 0x0, 0x70bd2d, 0x1c19, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000012c0)={@rand_addr, @remote, 0x0}, &(0x7f0000001300)=0xc) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000001440)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001400)={&(0x7f0000001340)={0x58, 0x0, 0x0, 0x70bd2d, 0x1c19, {}, [{{0x8, 0x1, r4}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000480)={0x3c, 0x0, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x26044050) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, 0x0, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="249fbb92ff4c302a67d5f6e627cbe8417f00003a498e46d3ab36fe1700", @ANYRES16=r6, @ANYBLOB="00032dbd7000fedbdf250d000000050038000100000005002a0000000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4880) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/bus/input/handlers\x00', 0x0, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r7, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r6, 0x61d, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x4) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r6, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8001}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}]}, 0x28}}, 0x4090) ioctl$sock_SIOCADDRT(r5, 0x890b, &(0x7f00000002c0)={0x0, @l2tp={0x2, 0x0, @private=0xa010100}, @hci={0x1f, 0x3, 0x2}, @generic={0x11, "033a93898b5767b6cf1abeae04ec"}, 0x7ff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fffffff, 0x100, 0x5}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x0, 0x7f11}}) 03:53:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback, @dev}}}], 0x20}}], 0x1, 0x0) 03:53:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fe00000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001840)={'team0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) [ 1112.774567][T14887] loop5: detected capacity change from 0 to 224 03:53:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000030000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:02 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000220000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:02 executing program 0: add_key$user(&(0x7f0000000100), &(0x7f00000011c0)={'syz', 0x0}, &(0x7f0000001200)='`', 0x1, 0xfffffffffffffffc) 03:53:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000008f01000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:02 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000018c0)='/sys/class/ata_device', 0x0, 0x0) openat$cgroup(r0, &(0x7f0000001900)='syz1\x00', 0x200002, 0x0) 03:53:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000004c0)={'ip6_vti0\x00', 0x0}) 03:53:02 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000540), 0x1, 0x0) 03:53:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000004030000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1112.951920][T14931] loop5: detected capacity change from 0 to 224 03:53:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000009a01000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), r0) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 03:53:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89a2, &(0x7f0000000180)={'bridge_slave_1\x00', 0x0}) 03:53:02 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000250000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, @l2tp={0x2, 0x0, @private}, @hci, @generic={0x0, "033a93898b5767b6cf1abeae04ec"}, 0x7ff, 0x0, 0x0, 0x0, 0x9003}) 03:53:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000058030000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000009b01000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:02 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) 03:53:02 executing program 0: setresuid(0x0, 0xee01, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000680)) [ 1113.135121][T14968] loop5: detected capacity change from 0 to 224 03:53:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x21, &(0x7f0000000340)="604fd1b8", 0x4) 03:53:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000009a030000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:02 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000003f0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000680)={0x2, &(0x7f0000000640)=[{0x1c}, {0x6}]}) 03:53:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000402000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, &(0x7f0000000340)='`', 0x300) 03:53:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002080)=[{{&(0x7f00000001c0)={0x2, 0x4e24, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000003c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @dev}}}, @ip_retopts={{0x10, 0x29}}], 0x30}}], 0x1, 0x0) 03:53:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000ec030000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@context={'context', 0x2c, 'staff_u'}}]}) [ 1113.369963][T15016] loop5: detected capacity change from 0 to 224 03:53:02 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000400000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, @l2tp={0x2, 0x0, @private=0x2}, @hci, @generic={0x0, "033a93898b5767b6cf1abeae04ec"}, 0x7ff}) 03:53:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000006402000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000fa030000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1113.404422][ T25] audit: type=1326 audit(1628653982.823:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14999 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 03:53:02 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), r0) 03:53:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001540)={0x0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={0x0}}, 0x0) 03:53:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, @l2tp={0x2, 0x0, @private=0x2}, @hci, @generic={0x0, "033a93898b5767b6cf1abeae04ec"}, 0x7ff}) 03:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000006502000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000fc030000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1113.552217][T15051] loop5: detected capacity change from 0 to 224 03:53:03 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_L}]}}) 03:53:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={0x0, @l2tp={0x2, 0x0, @multicast2}, @vsock={0x28, 0x0, 0x0, @host}, @xdp, 0x5}) 03:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000007002000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:03 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000480000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, @l2tp={0x2, 0x0, @private=0x2}, @hci, @generic={0x0, "033a93898b5767b6cf1abeae04ec"}, 0x7ff}) 03:53:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000002040000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1113.706850][T15075] 9pnet: Insufficient options for proto=fd 03:53:03 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @mcast2}}) 03:53:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0xb, &(0x7f0000000340)='`', 0x1) 03:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000003000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1113.748636][T15092] loop5: detected capacity change from 0 to 224 03:53:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, @l2tp={0x2, 0x0, @private=0x2}, @hci, @generic={0x0, "033a93898b5767b6cf1abeae04ec"}, 0x7ff}) 03:53:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000003040000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:03 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000004c0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000204000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0xd, &(0x7f0000000340)='`', 0x1) 03:53:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8970, &(0x7f0000000180)={'bridge_slave_1\x00', 0x0}) 03:53:03 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000680)={0x2, &(0x7f0000000640)=[{0xac}, {0x6}]}) 03:53:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000006040000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1113.941994][T15134] loop5: detected capacity change from 0 to 224 03:53:03 executing program 2: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x1}, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) 03:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000604000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:03 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000002610000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000010040000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1114.012720][ T25] audit: type=1326 audit(1628653983.433:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15141 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 03:53:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg(r0, &(0x7f00000055c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4000) 03:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000005000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 03:53:03 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000680)={0x2, &(0x7f0000000640)=[{0x15, 0x0, 0x0, 0xce0e1e00}, {0x6}]}) [ 1114.107161][T15167] loop5: detected capacity change from 0 to 224 03:53:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f0000000200), r0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[], 0x14}}, 0x0) 03:53:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000050000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:03 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000002640000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:03 executing program 0: socket(0x2, 0x0, 0x403) 03:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000006000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1114.205355][ T25] audit: type=1326 audit(1628653983.623:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15182 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 03:53:03 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000500)='/sys/block/loop0', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x8000000) 03:53:03 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) connect$packet(r0, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) 03:53:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000060000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1114.299628][T15207] loop5: detected capacity change from 0 to 224 03:53:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x22, &(0x7f0000000340)='`', 0x1) 03:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000406000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:03 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000002650000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:03 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000003a00)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@smackfshat={'smackfshat', 0x3d, 'trans=fd,'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}}) 03:53:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002080)=[{{&(0x7f0000000040)={0xa, 0x0, @remote}, 0x10, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x1, 0x0) 03:53:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000004060000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000007000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f0000000200), r0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000bc0)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x201}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[], 0x14}}, 0x0) [ 1114.445144][T15236] loop5: detected capacity change from 0 to 224 [ 1114.471966][T15241] 9pnet: Insufficient options for proto=fd 03:53:03 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 03:53:04 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000680000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000070000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:04 executing program 0: r0 = eventfd(0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 03:53:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fc07000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:04 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8931, &(0x7f0000000180)={'bridge_slave_1\x00', 0x0}) 03:53:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000090000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x6) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) [ 1114.647551][T15286] loop5: detected capacity change from 0 to 224 03:53:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002d40)=[{{&(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000200)="e5", 0x1}], 0x1}}], 0x2, 0x8040) 03:53:04 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000016a0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:04 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000002c0)={'batadv_slave_0\x00'}) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/block/loop0', 0x80040, 0x0) 03:53:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000009000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:04 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000500)='/sys/block/loop0', 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f00000002c0)='devices.allow\x00', 0x2, 0x0) 03:53:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000a0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, @l2tp={0x2, 0x0, @private}, @hci, @l2={0x1f, 0x9, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0x7ff, 0x0, 0x0, 0x0, 0x7, 0x0, 0x42}) 03:53:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000a000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1114.855258][T15326] loop5: detected capacity change from 0 to 224 03:53:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000b0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000001900)=[{{&(0x7f0000000000)={0x2, 0xaf72}, 0x10, 0x0, 0x0, &(0x7f00000017c0)=[@ip_retopts={{0x10}}, @ip_retopts={{0x10}}], 0x20}}], 0x1, 0x0) 03:53:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x14, &(0x7f0000000340)="604fd1b8", 0x4) 03:53:04 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000006c0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000680)={0x2, &(0x7f0000000640)=[{0x6c}, {0x6}]}) 03:53:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000b000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f0000004cc0)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0) 03:53:04 executing program 1: syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='dots,defcontext=', @ANYBLOB=',appraisl']) 03:53:04 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000740000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000c0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1115.025724][T15360] loop5: detected capacity change from 0 to 224 [ 1115.033939][ T25] audit: type=1326 audit(1628653984.453:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15357 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 03:53:04 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x0) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000b40)={&(0x7f0000000a40), 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14}, 0x14}}, 0x0) 03:53:04 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 03:53:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000c000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:04 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000003740)=[{&(0x7f0000002680)="acae46f0261d9f95eaa05ccff54ebdcfa365c39838f487bf2c6c336b2340d03c9b1d2c8d689e0b87fae5880da2cd8ed4d9e88181b0f59ce9d59c75d302e32ec29c4ff1fd14494a7552750507b15b8b5d0d7b14db4f8a5d1a1fe91158b2421ceead061502dc2c3e58ed0668e881e4cac69c6ab266e576a0d590c82fb4abd377056defe13de5ce9e6e9fdbf090c259ee123356ea90daed58c53d797eec60ce3e6839a4738ac8d94495cb219cb260cfd361b90901029885625e4164142552e2265ae356104bd7496edd342c3211b52f2cfcd9ebdb124d4f5261940d456dfc52ea3a5e46f0fa9c9416a44a251b6289f4d5d27f699d29c5bd790df547ae9c3d9e52042be735dd1a3a981d23079a979e993e68d266474feffdfa7208c693f0bb4dc8b8ef63c7b07050e217026d55265b0e16ef5b7e59b7628d369c2eb5882b73e4010097f023b06c73e3e1e5b36c864669ee654828f194302de976fe8cb0b6adcf72e2bfcba9c9561246db3b816dc67dd4c8a5ae945b0c8df30d82879de4df01f81953865341b68366298d4ea57225bf846aca57b67d857c95364e33365080fa3b44fb0b3612b220cd4c2e71e6fdedf273488f935cc4fbe221bedf4d27190f9ee91890f38ecfb72ac58ead47bca7584dfc61ec81d57ada6ed3214f296712d2b2be9d05961a2201485e19fc001693a795bedffc079369a2036d34333a92f9272183e4109af236941040e783f2b6ebd95b3cd4427ca766362b45ce39839ab37140792f0ff0c11e985bfd99cec2c1da325fe1fa2ca8983130c09a4db79c1cfd7906b7d44cd1862b8e110da381fd5408e7d9f13bc1c37cc6964d1c8718b05524a134b1f19b138e1818b1d0c2d4165a5ba6056a9f16478364e2bdddd273486eed91064d1164c3da21c4aa987a08670fab86ad8fccf23c07d5f1ab1f50fe2ac4787508ed47071949b491cec60a89c4393e02dc859951771f11623c7ee76c17833eb02f0f62f596a85fa0282179ace6b60f9af468b0b4fba5f5b42dca9b1f757671532cc401cedb63135fa90d41c12a19f7d42ca0d1d15c81abfcefa02456767f02f375d42619a17b1e327c4802ff55d74459f6f5e49d1a9bf4cf1a729e28e807dc3dbb8197b7988cf33d809a220266b5ab68a06d7509fbccd36ce7ae5e2ddc082ed684491b59729992cdc5d73e98ddb87f876edc8a54b66eaff04b8a1b98c8abf146862cf567a9f95ae1d1e53aaa1f4bedc33b731ac4015ade0815ac42cb9baa4b17f4ce238f790e33d5329ff5d4e09e9548a01d3c6ce21c928452e035a9bef03b1f6aae9064e260b841658f0035b2974bbedff7528f2f0bdde4beb83d091575efebd24f68591d20e86874835923ee8549bb84f8b41089f1b4ec9435a30049ca9611920dbc36083c5c781b5758eac5e89b30d7968f598558e88ff5df5b74f77b99f210719cdc076f33ccc93ccf953c736cf567be64b976667701533b2750276fe6e2430e85d72be9521f94a91fe5e58f60293a1d6e198c13676211a1ea4c6a78885e273e720c241dcd1bca01ab5e446fafc495644623eddc3b963af90b792ad6dfa10a52ed2446ec03bf30320e0e4fb4854c825a6e720e0f3086269f1fbd44d3bd2e3d6b820b8520f33905ae7a058d75dcaaf8effacc27aa3ff36f805792f1de179c0074690ef30daaa491f56233fdc6d71510a67053e0a8f7055eeca8b18bd6397f70d092661e48238fb4818d5363711bf5557265afdc8202a64647f6a292db164f08955c78ebaab65f850f3d0a10f45143a15ffff93ede2d07986b5682ae3d5da41d1e9ea9a339eab75600681fad367e7578a9c313fc19d1704ab1a9e6187a239c04c9b3fa62d5079f22cde70d073709db4bf4c3807d209e80ea30c8955b56e38cee3bec497c9f72106f52631465614cb5fef90fce8ecf19bdbcef5721dd47622599bb7de89e0c0eb8df3df961506e30d696efef08c03bbb1d32ce5bf6152bf141cd191106ff024db02049a28573f03c5e9cb2747dd7588cdae763dc560dbc4c61f314496c65ba7804cbae18344b706585798ac8207ca3fdf62eac8e2bdfee0c5d41050d194d3b8ac8ea9896c8fd799a74f28b9494c1fc50383bf74c28fdae8910c47901dfbd0f5735463c1cd6402824b66d45023f947e2f0840bbb8fbfa4b13bcf131c3e159f620929798a10819f9fc3d9b70aeceb5811ea86f93097e959d2150c5e002e033e58246f3a4d5976c6236a794b9da3cec16c29bd4c5cd31d89d489ce8072accbcd999bad7421b8d7df787bb237e9572a2642f67f0cbc65a90ff545d269bd5173dc19be3f98b8494944a3cc9e3fd75f34e160d62f4068e20d0375173e51bc71bf1135a50c652b4408676552b5e3b339e1966645e520a950dfdfb4e639c0ebf999ba57357db92c220c6bc80e1c63a373649a150b2fdd627420a2b1170d766af0f0c80632e283dbbdddf643b8fb7af771c287dc1b0680a55db9bbaa7d7df759619b4b43556e7b6fcd99dda598100be45288afc03c7b69dcf0eb457c4252bd754f54c3f22c0fea2eeb6c2d16024626185a48a50fb7e7f3f4a2cdf52796d0d2dd6cc16d911d32afce66defb19377c32a8fde63368bc98de946677382b23e3df131c6e7a27647ab12d0de2629e0eafce70169aaeae131252ec5c9cbdb9ba4d9c22838ac8c1c856858eb74900f75cc06e9aed2310e32e695a2729d0fb8e6409397f7d7c956b52f2fdb149557da129c68a89c443c909344818fe70f97690244674b85af3e8c77d3b1b51ffb6f4ab14d5cacdd4d68b463304633b49f6728e21a9d4323d64257592feff63878b13a01a85fc76e704ac89e95fc8333d009d1a508a9c9b6761e762de2fa0b8fc9ccd718438a54f36e72408f1dbac30d0995e93c4d96492baae20201cf75ced11a7f1add3db0f3f7d0994a35506d8ccecda5cf2fa229707ad2df1419e617160747a579c66cf8a2c297c867124dca7725e41c78c157f0c4094dedbb6cd105aac0878f98391f843f30c54416abb603640eca2a39e5d21cbfc95a5fca7d78cac636dec3c81837148890ddbaca358c1871d78011b25f3aac08cae1b7b354258b6a3ade00455f7af96dd3e4ee8bf18af5fd0ded32a077faa39374591ed54a6a879c1d65071e2426c2fdbd27146df4679f7710b0fac3a7d7e832c31b0f04985cbccac748eaa4f1c517123772ec50b94d367d1708af02aee7c427e26083a51965e7b0c4ba465ffd0444dc68d0dd82d580ec8f188dc51b3bb4524aed8e14e6976ab07ce3d3c516cb0287ce7f744b33b4ffa69d11db45918ab5a45f030451fc785d8e286aad32e05fe751a18ca350a1c582f06df1a3014d51a6e28fbc764bfebdf903c650c2bf75fac11535ed934af182226ed5b874de54bd64f7d8357d0466d7a959f11ad19c8b5d4834a16453ab5b49fcb814f316313d362664eb54a7b6", 0x981}], 0x0, 0x0) 03:53:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000d0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x28, &(0x7f0000000140)="14da445a25c9357e27f6ab6c", 0xc) [ 1115.178131][T15387] loop5: detected capacity change from 0 to 224 03:53:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {0x0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080000000", 0x20, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {0x0}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f0000014a00)) 03:53:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000d000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:04 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000007a0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:04 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x10001]}, &(0x7f0000000040), 0x8) 03:53:04 executing program 2: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000840)={[{@fat=@errors_continue}], [{@context={'context', 0x3d, 'staff_u'}, 0x22}]}) 03:53:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000e0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:04 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) select(0x40, &(0x7f0000000740)={0x7}, &(0x7f0000000780)={0x80}, 0x0, &(0x7f0000000800)={0x77359400}) 03:53:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000680)={0x2, &(0x7f0000000640)=[{0x61}, {0x6}]}) 03:53:04 executing program 2: syz_genetlink_get_family_id$netlbl_cipso(0x0, 0xffffffffffffffff) [ 1115.374434][T15426] loop5: detected capacity change from 0 to 224 03:53:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000e000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:04 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000ffffff850000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000f0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:04 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 03:53:04 executing program 2: clone(0x58830180, 0x0, 0x0, 0x0, 0x0) 03:53:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), r0) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000006c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000540)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 03:53:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000f000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x15, &(0x7f0000000340)='`', 0x1) [ 1115.556768][T15458] loop5: detected capacity change from 0 to 224 03:53:05 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 03:53:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000002010000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x20000050, 0x0, 0x0, &(0x7f0000000300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @dev}}}], 0x20}}], 0x1, 0x0) 03:53:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000004100000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:05 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000ffffff8c0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) sendmmsg$inet(r0, &(0x7f0000002080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0}}], 0x1, 0x0) 03:53:05 executing program 0: syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002780)={[], [], 0x22}) 03:53:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000020100000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1115.700338][T15494] loop5: detected capacity change from 0 to 224 03:53:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000011000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000640)=[{{&(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000080)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@ip_ttl={{0x14}}], 0x18}}], 0x2, 0x20048014) 03:53:05 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000002940000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, 0x0, &(0x7f0000000100)) 03:53:05 executing program 0: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000580)={[{@fat=@dmask}]}) 03:53:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000012000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000110000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8912, &(0x7f0000000180)={'bridge_slave_1\x00', 0x0}) 03:53:05 executing program 1: syz_mount_image$msdos(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000a40), 0x0, &(0x7f0000000a80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1115.868958][T15522] loop5: detected capacity change from 0 to 224 03:53:05 executing program 0: socket(0x3c, 0x0, 0x0) 03:53:05 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000019a0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000020000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000120000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f0000000200), r0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000bc0)={&(0x7f0000000b00), 0xc, &(0x7f0000000b80)={0x0, 0x14}}, 0x0) 03:53:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'erspan0\x00', 0x0}) 03:53:05 executing program 0: setresuid(0x0, 0xee01, 0x0) setresuid(0x0, 0xee01, 0xffffffffffffffff) 03:53:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000001020000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1116.029183][T15552] loop5: detected capacity change from 0 to 224 03:53:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000140000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:05 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000019b0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x13, &(0x7f0000000340)='`', 0x1) 03:53:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x11, 0x0, &(0x7f0000000340)="604fd1b8", 0x4) 03:53:05 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x9, 0x0, 0x1, 0x0, 0x6, @random="5e19720c6a06"}, 0x14) 03:53:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000022000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x891f, &(0x7f0000000180)={'bridge_slave_1\x00', 0x0}) 03:53:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000008e40)=[{{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000240)="97", 0x1}, {0x0}, {&(0x7f0000001340)='r', 0x1}], 0x3}}], 0x1, 0x0) 03:53:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000180000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1116.244260][T15595] loop5: detected capacity change from 0 to 224 03:53:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 03:53:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000025000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:05 executing program 1: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x22400, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="a8e3d97cf87c65c6c7fa06f2a20aadede6b54449943049a5d3401ef6244979f99316c77be9f61b45cdd96659148118ff4d398561de1a6d4e02f81193d63f44d2a7408b4ac6875e03ba8e856ac1f59f21904faaf5af2637b02a6357f4df32d2ba19668637cb918179f7753261fec2d88649f747001851ac370d6ae701b69c7c94b99274063b84fc476254e9f3771dd53c95d1305dd6053349ac4548bbfb86a3cfd3f10fbc65830bcd4da6ceb701e3fe70bf1e37189a7da6d01e880bf358ef60a4c4c36a0489af6cf60afabee1d5418cd270c0b9fd9f46a8fb331351a2baef483948ace1a9e8bc2184f1b916edebab1103e7") 03:53:05 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000019e0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:05 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000500)='/sys/block/loop0', 0x0, 0x0) getsockname$packet(r0, 0x0, 0x0) 03:53:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000ed180000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002080)=[{{&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, 0x0, 0xa, &(0x7f0000000300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @dev}}}], 0x20}}], 0x1, 0x0) 03:53:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000003f000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8924, &(0x7f0000000180)={'bridge_slave_1\x00', 0x0}) 03:53:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x24, &(0x7f0000000340)='`', 0x300) 03:53:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000ef180000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1116.454941][T15631] loop5: detected capacity change from 0 to 224 03:53:05 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000edc00000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000040000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:06 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) 03:53:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002080)=[{{&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, 0x0, 0x300, &(0x7f0000000300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @dev}}}], 0x20}}], 0x1, 0x0) 03:53:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 03:53:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000190000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:06 executing program 1: setresuid(0x0, 0xee01, 0x0) r0 = geteuid() setresuid(r0, 0x0, 0x0) [ 1116.620149][T15665] loop5: detected capacity change from 0 to 224 03:53:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000048000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f00000002c0)={0x0, @l2tp={0x2, 0x0, @private}, @hci, @generic={0x0, "033a93898b5767b6cf1abeae04ec"}, 0x7ff}) 03:53:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f0000000180)={'bridge_slave_1\x00', 0x0}) 03:53:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000200000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:06 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000ffffffda0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:06 executing program 1: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x0, 0x0) 03:53:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x20, 0x0, 0x0, 0x3f3}, {0x6}]}) 03:53:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000004c000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:06 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x0) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14}, 0x14}}, 0x0) 03:53:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000060000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000010200000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1116.835713][T15708] loop5: detected capacity change from 0 to 224 03:53:06 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x10001]}, 0x0, 0x8) 03:53:06 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000fffffff00000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001540)={0x0}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000017c0), r0) 03:53:06 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)={0x0, 0xffffffffffffff99}}, 0x0) 03:53:06 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) 03:53:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000220000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1116.949757][ C1] print_req_error: 490 callbacks suppressed [ 1116.949774][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1116.966535][ C1] buffer_io_error: 490 callbacks suppressed [ 1116.966548][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x20048c11) 03:53:06 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000007980)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize}], [{@smackfsroot={'smackfsroot', 0x3d, 'allow_utime'}}]}}) 03:53:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000264000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1117.063731][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1117.074618][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000250000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:06 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) 03:53:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000680)={0x3, &(0x7f0000000640)=[{}, {0xa4}, {0x6}]}) 03:53:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) [ 1117.116936][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1117.127840][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1117.136294][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1117.147163][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1117.197801][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1117.208717][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1117.229465][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1117.240348][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1117.244568][T15783] loop5: detected capacity change from 0 to 224 [ 1117.249432][T15777] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15777 comm=syz-executor.0 [ 1117.259220][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1117.277922][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1117.286624][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1117.297490][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1117.305327][ T25] audit: type=1326 audit(1628653986.713:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15775 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 [ 1117.328992][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1117.339861][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:06 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000fffffff60000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000265000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:06 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) 03:53:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000002e0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:06 executing program 1: syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002540), 0x0, &(0x7f0000002780)=ANY=[@ANYBLOB='allow_utime=000000A']) 03:53:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x5, &(0x7f0000000340)="604fd1b8", 0x4) [ 1117.348088][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1117.358955][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$dir(0xffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 03:53:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000320000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002080)=[{{&(0x7f0000000040)={0xa, 0x0, @remote}, 0x10, 0x0, 0x0, 0x0, 0x4}}], 0x1, 0x0) 03:53:06 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) [ 1117.472663][T15807] loop5: detected capacity change from 0 to 224 03:53:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000068000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:07 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000fffffdf90000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x3, &(0x7f0000000340)="604fd1b8", 0x4) 03:53:07 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000003740)=[{&(0x7f0000002240)="f9", 0x1}, {&(0x7f0000002680)="acae46f0261d9f95eaa05ccff54ebdcfa365c39838f487bf2c6c336b2340d03c9b1d2c8d689e0b87fae5880da2cd8ed4d9e88181b0f59ce9d59c75d302e32ec29c4ff1fd14494a7552750507b15b8b5d0d7b14db4f8a5d1a1fe91158b2421ceead061502dc2c3e58ed0668e881e4cac69c6ab266e576a0d590c82fb4abd377056defe13de5ce9e6e9fdbf090c259ee123356ea90daed58c53d797eec60ce3e6839a4738ac8d94495cb219cb260cfd361b90901029885625e4164142552e2265ae356104bd7496edd342c3211b52f2cfcd9ebdb124d4f5261940d456dfc52ea3a5e46f0fa9c9416a44a251b6289f4d5d27f699d29c5bd790df547ae9c3d9e52042be735dd1a3a981d23079a979e993e68d266474feffdfa7208c693f0bb4dc8b8ef63c7b07050e217026d55265b0e16ef5b7e59b7628d369c2eb5882b73e4010097f023b06c73e3e1e5b36c864669ee654828f194302de976fe8cb0b6adcf72e2bfcba9c9561246db3b816dc67dd4c8a5ae945b0c8df30d82879de4df01f81953865341b68366298d4ea57225bf846aca57b67d857c95364e33365080fa3b44fb0b3612b220cd4c2e71e6fdedf273488f935cc4fbe221bedf4d27190f9ee91890f38ecfb72ac58ead47bca7584dfc61ec81d57ada6ed3214f296712d2b2be9d05961a2201485e19fc001693a795bedffc079369a2036d34333a92f9272183e4109af236941040e783f2b6ebd95b3cd4427ca766362b45ce39839ab37140792f0ff0c11e985bfd99cec2c1da325fe1fa2ca8983130c09a4db79c1cfd7906b7d44cd1862b8e110da381fd5408e7d9f13bc1c37cc6964d1c8718b05524a134b1f19b138e1818b1d0c2d4165a5ba6056a9f16478364e2bdddd273486eed91064d1164c3da21c4aa987a08670fab86ad8fccf23c07d5f1ab1f50fe2ac4787508ed47071949b491cec60a89c4393e02dc859951771f11623c7ee76c17833eb02f0f62f596a85fa0282179ace6b60f9af468b0b4fba5f5b42dca9b1f757671532cc401cedb63135fa90d41c12a19f7d42ca0d1d15c81abfcefa02456767f02f375d42619a17b1e327c4802ff55d74459f6f5e49d1a9bf4cf1a729e28e807dc3dbb8197b7988cf33d809a220266b5ab68a06d7509fbccd36ce7ae5e2ddc082ed684491b59729992cdc5d73e98ddb87f876edc8a54b66eaff04b8a1b98c8abf146862cf567a9f95ae1d1e53aaa1f4bedc33b731ac4015ade0815ac42cb9baa4b17f4ce238f790e33d5329ff5d4e09e9548a01d3c6ce21c928452e035a9bef03b1f6aae9064e260b841658f0035b2974bbedff7528f2f0bdde4beb83d091575efebd24f68591d20e86874835923ee8549bb84f8b41089f1b4ec9435a30049ca9611920dbc36083c5c781b5758eac5e89b30d7968f598558e88ff5df5b74f77b99f210719cdc076f33ccc93ccf953c736cf567be64b976667701533b2750276fe6e2430e85d72be9521f94a91fe5e58f60293a1d6e198c13676211a1ea4c6a78885e273e720c241dcd1bca01ab5e446fafc495644623eddc3b963af90b792ad6dfa10a52ed2446ec03bf30320e0e4fb4854c825a6e720e0f3086269f1fbd44d3bd2e3d6b820b8520f33905ae7a058d75dcaaf8effacc27aa3ff36f805792f1de179c0074690ef30daaa491f56233fdc6d71510a67053e0a8f7055eeca8b18bd6397f70d092661e48238fb4818d5363711bf5557265afdc8202a64647f6a292db164f08955c78ebaab65f850f3d0a10f45143a15ffff93ede2d07986b5682ae3d5da41d1e9ea9a339eab75600681fad367e7578a9c313fc19d1704ab1a9e6187a239c04c9b3fa62d5079f22cde70d073709db4bf4c3807d209e80ea30c8955b56e38cee3bec497c9f72106f52631465614cb5fef90fce8ecf19bdbcef5721dd47622599bb7de89e0c0eb8df3df961506e30d696efef08c03bbb1d32ce5bf6152bf141cd191106ff024db02049a28573f03c5e9cb2747dd7588cdae763dc560dbc4c61f314496c65ba7804cbae18344b706585798ac8207ca3fdf62eac8e2bdfee0c5d41050d194d3b8ac8ea9896c8fd799a74f28b9494c1fc50383bf74c28fdae8910c47901dfbd0f5735463c1cd6402824b66d45023f947e2f0840bbb8fbfa4b13bcf131c3e159f620929798a10819f9fc3d9b70aeceb5811ea86f93097e959d2150c5e002e033e58246f3a4d5976c6236a794b9da3cec16c29bd4c5cd31d89d489ce8072accbcd999bad7421b8d7df787bb237e9572a2642f67f0cbc65a90ff545d269bd5173dc19be3f98b8494944a3cc9e3fd75f34e160d62f4068e20d0375173e51bc71bf1135a50c652b4408676552b5e3b339e1966645e520a950dfdfb4e639c0ebf999ba57357db92c220c6bc80e1c63a373649a150b2fdd627420a2b1170d766af0f0c80632e283dbbdddf643b8fb7af771c287dc1b0680a55db9bbaa7d7df759619b4b43556e7b6fcd99dda598100be45288afc03c7b69dcf0eb457c4252bd754f54c3f22c0fea2eeb6c2d16024626185a48a50fb7e7f3f4a2cdf52796d0d2dd6cc16d911d32afce66defb19377c32a8fde63368bc98de946677382b23e3df131c6e7a27647ab12d0de2629e0eafce70169aaeae131252ec5c9cbdb9ba4d9c22838ac8c1c856858eb74900f75cc06e9aed2310e32e695a2729d0fb8e6409397f7d7c956b52f2fdb149557da129c68a89c443c909344818fe70f97690244674b85af3e8c77d3b1b51ffb6f4ab14d5cacdd4d68b463304633b49f6728e21a9d4323d64257592feff63878b13a01a85fc76e704ac89e95fc8333d009d1a508a9c9b6761e762de2fa0b8fc9ccd718438a54f36e72408f1dbac30d0995e93c4d96492baae20201cf75ced11a7f1add3db0f3f7d0994a35506d8ccecda5cf2fa229707ad2df1419e617160747a579c66cf8a2c297c867124dca7725e41c78c157f0c4094dedbb6cd105aac0878f98391f843f30c54416abb603640eca2a39e5d21cbfc95a5fca7d78cac636dec3c81837148890ddbaca358c1871d78011b25f3aac08cae1b7b354258b6a3ade00455f7af96dd3e4ee8bf18af5fd0ded32a077faa39374591ed54a6a879c1d65071e2426c2fdbd27146df4679f7710b0fac3a7d7e832c31b0f04985cbccac748eaa4f1c517123772ec50b94d367d1708af02aee7c427e26083a51965e7b0c4ba465ffd0444dc68d0dd82d580ec8f188dc51b3bb4524aed8e14e6976ab07ce3d3c516cb0287ce7f744b33b4ffa69d11db45918ab5a45f030451fc785d8e286aad32e05fe751a18ca350a1c582f06df1a3014d51a6e28fbc764bfebdf903c650c2bf75fac11535ed934af182226ed5b874de54bd64f7d8357d0466d7a959f11ad19c8b5d4834a16453ab5b49fcb814f316313d362664eb54a7b6", 0x981}], 0x0, 0x0) 03:53:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg$inet(r0, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=ANY=[], 0xf}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[], 0x1c8}}], 0x2, 0x0) 03:53:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000003f0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000006c000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002880)=[{{&(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000700)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000cc0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3, 0x2a}, @timestamp={0x44, 0x4}]}}}], 0x18}}], 0x2, 0x0) 03:53:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4020940d, &(0x7f0000000180)={'bridge_slave_1\x00', 0x0}) 03:53:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000400000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:07 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff}) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x7ffffffff000, 0x0, 0x10, r0, 0x10000000) [ 1117.682623][T15850] loop5: detected capacity change from 0 to 224 03:53:07 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000fffffdfd0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000002470000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:07 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000002040), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, 0x0) 03:53:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x32, &(0x7f0000000340)='`', 0x1) 03:53:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000270000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:07 executing program 2: pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0x6]}, 0x8}) 03:53:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000480000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1117.859057][T15882] loop5: detected capacity change from 0 to 224 03:53:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000540)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @private2}}) 03:53:07 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000500)='/sys/block/loop0', 0x102, 0x0) 03:53:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000680)={0x3, &(0x7f0000000640)=[{}, {0x87}, {0x6}]}) 03:53:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000074000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:07 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000fffffffe0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000004c0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1117.997063][ T25] audit: type=1326 audit(1628653987.423:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15899 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 03:53:07 executing program 0: pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0x6]}, 0x8}) 03:53:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000007a000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, @l2tp={0x2, 0x0, @private=0xfffffffe}, @hci, @generic={0x0, "033a93898b5767b6cf1abeae04ec"}, 0x7ff}) 03:53:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000002560000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:07 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000500)='/sys/block/loop0', 0x0, 0x0) time(&(0x7f0000000000)) [ 1118.068611][T15918] loop5: detected capacity change from 0 to 224 03:53:07 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000fff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000084000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f00000002c0)={0x0, @l2tp={0x2, 0x0, @dev}, @tipc=@name, @generic={0x0, "033a93898b5767b6cf1abeae04ec"}, 0x7ff}) 03:53:07 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000007980)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize}]}}) 03:53:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000002570000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:07 executing program 1: syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002780)={[], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}], 0x22}) 03:53:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x4, &(0x7f0000000040)="0718b104eb945b56b89a8017d12e14da4d5a0400fc", 0x15) [ 1118.237764][T15950] loop5: detected capacity change from 0 to 224 03:53:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000088000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x32, &(0x7f0000000340)="604fd1b8", 0x4) 03:53:07 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000fffff7ff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000003580000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8943, &(0x7f0000000180)={'bridge_slave_1\x00', 0x0}) 03:53:07 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(0x0, 0xffffffffffffffff) mknodat$null(0xffffffffffffff9c, &(0x7f0000000e40)='./file0\x00', 0x0, 0x103) 03:53:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000018f000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:07 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@generic={0x0, 0x2}]}}}], 0x18}}], 0x1, 0x0) 03:53:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000025e0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1118.421284][T15984] loop5: detected capacity change from 0 to 224 03:53:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f0000004cc0)=[{{&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random="ed8cf7424732"}, 0x80, &(0x7f0000001500)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) 03:53:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f00000025c0)=[{{&(0x7f00000001c0)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@ip_retopts={{0x3c, 0x0, 0x7, {[@cipso={0x86, 0x29, 0x0, [{0x0, 0x5, "a177b6"}, {0x0, 0x11, "243558821caa40c123915b63c30d07"}, {0x0, 0xd, "9f3b641a385d2687d988cd"}]}]}}}], 0x40}}], 0x1, 0x0) 03:53:07 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000fffffbff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000025f0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000019a000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002080)=[{{&(0x7f0000000040)={0xa, 0x4e24, @remote}, 0x20000050, 0x0, 0x0, &(0x7f0000000300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @dev}}}], 0x20}}], 0x1, 0x0) 03:53:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x4, &(0x7f0000000040)="2ab5b104eb945b56b89a8017d12e14da4d5a0400fc90c0", 0x17) 03:53:08 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={0x0, 0x108}}, 0x0) 03:53:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 03:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000019b000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:08 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000600000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1118.601852][T16026] loop5: detected capacity change from 0 to 224 03:53:08 executing program 1: syz_open_dev$vcsn(&(0x7f0000000000), 0xffffffffffffffff, 0x240000) 03:53:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @dev}}}], 0xf}}], 0x1, 0x0) 03:53:08 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000001fffff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect(r0, &(0x7f0000000140)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80) 03:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000c0ed000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:08 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f00000014c0)=[{0x0, 0x0, 0x100000000}, {&(0x7f00000003c0), 0x0, 0x800}, {&(0x7f00000004c0)="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", 0x551}]) 03:53:08 executing program 1: syz_io_uring_setup(0x0, &(0x7f0000000000), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x0, 0x0) 03:53:08 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 03:53:08 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000001620000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1118.757549][T16056] loop5: detected capacity change from 0 to 224 03:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000007fc000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:08 executing program 0: alarm(0x7) 03:53:08 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000fff7ffff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:08 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x0) 03:53:08 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f00000014c0)=[{&(0x7f0000000280)="bbeeb6cbf88bdb1c1e8e206d1061c2dfd6169c5c40715315443afff7e4fe6e708c116626469619556e4a8bc992e68e78adbc5c7e33a7bd55875991dab3ae4a623b8a5124085acf7f9a27a3e99e7a", 0x4e, 0x100000000}, {&(0x7f0000000300)="ae686ca44899e4802794585c087e0017ffa035c2dd0c3d0de7166579cf27fa20e77c703d", 0x24, 0x7}, {0x0, 0x0, 0x800}, {&(0x7f00000004c0)="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", 0xd0f, 0x2}]) 03:53:08 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000002640000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fffe000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x20000001, 0x0, 0x0) 03:53:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x13, &(0x7f0000000340)="604fd1b8", 0x4) 03:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000fff000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1118.939018][T16096] loop5: detected capacity change from 0 to 224 03:53:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000940)={'bond0\x00', {0x2, 0x0, @loopback}}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000940)={'bond0\x00', {0x2, 0x0, @loopback}}) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='vlan1\x00'}) ioctl$sock_SIOCETHTOOL(r0, 0x541b, &(0x7f0000000180)={'bridge_slave_1\x00', 0x0}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) 03:53:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg$inet(r0, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=ANY=[], 0xf}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="1c"], 0x1c8}}], 0x2, 0x0) 03:53:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000140)="14da445a25c9357e27000000", 0xc) 03:53:08 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000002650000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:08 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000fffbffff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000feff000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x8918, 0x0) 03:53:08 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000002c0)={'batadv_slave_0\x00', 0x0}) sendmmsg$inet(r1, &(0x7f0000002080)=[{{&(0x7f00000001c0)={0x2, 0x4e24, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000003c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @dev}}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@noop, @cipso={0x86, 0x1a, 0xffffffffffffffff, [{0x0, 0x3, "b8"}, {0x0, 0x2}, {0x0, 0xf, "c3a348b78ab908450e342c60b0"}]}, @noop]}}}], 0x50}}], 0x1, 0x0) 03:53:08 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000680000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:08 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000680)={0x2, &(0x7f0000000640)=[{0x4}, {0x6}]}) 03:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000020000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1119.160842][T16148] loop5: detected capacity change from 0 to 224 03:53:08 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0xa3, 0x201) write$P9_RSYMLINK(r0, &(0x7f0000000040), 0x14) 03:53:08 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000002680000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002d40)=[{{&(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000001580)='s', 0x1}], 0x1}}], 0x2, 0x8040) 03:53:08 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000f9fdffff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000680)={0x3, &(0x7f0000000640)=[{}, {0x64}, {0x6}]}) [ 1119.249928][ T25] audit: type=1326 audit(1628653988.674:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16161 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 03:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000040000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89b1, &(0x7f0000000180)={'bridge_slave_1\x00', 0x0}) 03:53:08 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x541b, &(0x7f0000000180)={'bridge_slave_1\x00', 0x0}) 03:53:08 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000001690000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1119.342778][ T25] audit: type=1326 audit(1628653988.764:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16188 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 [ 1119.369906][T16197] loop5: detected capacity change from 0 to 224 03:53:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000680)={0x2, &(0x7f0000000640)=[{0x74}, {0x6}]}) 03:53:08 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@ip_pktinfo={{0x1c, 0xfffffffe, 0x8, {0x0, @loopback, @dev}}}], 0x20}}], 0x1, 0x0) 03:53:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000080000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:08 executing program 2: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x8000002) 03:53:08 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000fdfdffff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000000)="a7b4bcc2bf7ad1a8c91925044c78d190946b6614b6bc416ae280d531c44f2a064990f510e855aa1a41e4e8604868faad66ccc78f468b94a913f13f711bb8d5fd29df270f862b5f1f10ce4b6d06a4197a527a511fa6bb8a0f49da74b298b0884a0ba88a5f21f1bd1cae7ee9c88d40bf66744c0928b9df2fc0bf401bd479358d18e0a34434cf913832a8ac2342b6d5efbb", 0x90) 03:53:08 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000002690000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1119.465541][ T25] audit: type=1326 audit(1628653988.864:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16212 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 03:53:08 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89a1, &(0x7f0000000180)={'bridge_slave_1\x00', 0x0}) 03:53:08 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000500)='/sys/block/loop0', 0x0, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x0) 03:53:09 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000006c0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000004000080000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:09 executing program 0: accept4(0xffffffffffffffff, 0x0, 0x0, 0xc1400) [ 1119.575874][T16237] loop5: detected capacity change from 0 to 224 03:53:09 executing program 1: socket(0x1, 0x0, 0xc74) 03:53:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, @l2tp={0x2, 0x0, @dev}, @tipc=@name, @generic={0x0, "033a93898b5767b6cf1abeae04ec"}, 0x7ff}) 03:53:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x890b, &(0x7f0000000280)={'\x00', 0x0}) 03:53:09 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000007fffffff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000c0000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:09 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000026c0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f0000000200), r0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={0x0, 0x14}}, 0x0) 03:53:09 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8994, &(0x7f0000000180)={'bridge_slave_1\x00', 0x0}) 03:53:09 executing program 0: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x22400, 0x0, &(0x7f0000000140), 0x0, 0x0) 03:53:09 executing program 2: syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002780)={[], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}, 0x22}], 0x22}) 03:53:09 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000085ffffff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1119.737087][T16274] loop5: detected capacity change from 0 to 224 03:53:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000400000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:09 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000026d0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, @l2tp={0x2, 0x0, @dev}, @tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x6}, 0x1}}, @generic={0x0, "033a93898b5767b6cf1abeae04ec"}, 0x7ff}) 03:53:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0xd, &(0x7f0000000340)="604fd1b8", 0x4) 03:53:09 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="8f"]) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0xffffffffffffffff) 03:53:09 executing program 1: syz_mount_image$vfat(&(0x7f000000a200), &(0x7f000000a240)='./file0\x00', 0x0, 0x0, &(0x7f000000a5c0), 0x1085c00, &(0x7f000000a640)) 03:53:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000100000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:09 executing program 2: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADLINK(r0, 0x0, 0x10) write$P9_RREADDIR(r0, &(0x7f00000000c0)={0xb}, 0xb) 03:53:09 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000002720000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1119.894911][T16313] loop5: detected capacity change from 0 to 224 03:53:09 executing program 0: r0 = socket(0x2, 0x3, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) 03:53:09 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000078c0), 0x0, 0x0) getdents(r0, 0x0, 0x81) 03:53:09 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000008cffffff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:09 executing program 2: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2b, 0x0, "a7c09f0d1f1afbf6a2a555f832e542ec4c4838b34c3ba311c6640832feb19f945578e9b98f5ec2c7c0f08b8272306dade8f751675c2627f7891a8cd3d16fd2747b7d7e38248bf3b3075920475ea3e256"}, 0xd8) 03:53:09 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000700200000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000200000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:09 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000002730000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(0x0, 0x1e3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) [ 1120.038768][T16346] loop5: detected capacity change from 0 to 224 03:53:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./bus/file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x89e0, 0x0) preadv(r1, &(0x7f0000000700)=[{&(0x7f0000000340)=""/252, 0xfffffffffffffcf7}, {&(0x7f0000001180)=""/4094, 0xffe}, {&(0x7f0000000440)=""/201, 0xc9}, {&(0x7f0000000200)=""/167, 0xa7}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000640)=""/188, 0xbc}, {&(0x7f0000000000)=""/86, 0x56}], 0x7, 0x7fff, 0x1000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x3, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x89e0, 0x0) r3 = accept4(r1, &(0x7f0000000780)=@ieee802154, &(0x7f00000000c0)=0xffffffffffffffaf, 0x400) close_range(r2, r3, 0x0) fork() mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) mbind(&(0x7f0000196000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x3) 03:53:09 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000700200000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:09 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000daffffff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000040200000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:09 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000740000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:09 executing program 2 (fault-call:9 fault-nth:0): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) [ 1120.216982][T16383] loop5: detected capacity change from 0 to 224 03:53:09 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000700200000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:09 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000007a0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000300000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:09 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000f0ffffff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1120.537638][T16416] FAULT_INJECTION: forcing a failure. [ 1120.537638][T16416] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1120.550729][T16416] CPU: 0 PID: 16416 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1120.559488][T16416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.569528][T16416] Call Trace: [ 1120.572820][T16416] dump_stack_lvl+0xb7/0x103 [ 1120.577400][T16416] dump_stack+0x11/0x1a [ 1120.581561][T16416] should_fail+0x23c/0x250 [ 1120.585967][T16416] should_fail_usercopy+0x16/0x20 [ 1120.590984][T16416] _copy_from_user+0x1c/0xd0 [ 1120.595590][T16416] sock_setsockopt+0x162/0x1d50 [ 1120.600490][T16416] __sys_setsockopt+0x14f/0x200 [ 1120.605337][T16416] __x64_sys_setsockopt+0x62/0x70 [ 1120.610413][T16416] do_syscall_64+0x3d/0x90 [ 1120.614826][T16416] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1120.620828][T16416] RIP: 0033:0x4665e9 [ 1120.624711][T16416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1120.644309][T16416] RSP: 002b:00007f19dfeb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1120.652762][T16416] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665e9 [ 1120.660782][T16416] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 [ 1120.668738][T16416] RBP: 00007f19dfeb11d0 R08: 0000000000000010 R09: 0000000000000000 [ 1120.676760][T16416] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000001 03:53:10 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000018c0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1120.684780][T16416] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 [ 1120.713141][T16415] loop5: detected capacity change from 0 to 224 03:53:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000400000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000140)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0\x19\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff-\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6\xc5\xb7w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa0M5\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xad\xbb!1\x85\x96P\x1b\x92\x01\xe6\xae\xb1\xecB)\xe5\xaa7\xfe\xe6,\x05\x00\xe5|\xb1j^\xaec}\x1a\xb4\x17\xafP\x85I\xd5\xa0I\xb0\xaf\xb5\x8b\\\x05\xd7g\xcbV\x8e\xd0\xac\x87I7\xbd\xc6\x9bI\x92\xb2\x87.\xb3\x1fs\xe7%\xdd+\r\xb4\x117\xa7ei~\xb8\x16\xd1P\xf2\x84\x89K\x16\xd00|\xa3\x89\xc9~9\x00\x00\x00\x00\x00\x00\x00\x17)z\xb9WT\xde\x88\xfc\xa8V\x92\xbb\x06\"\x01;6\xe8e\f;\xf4\xc4\x85\xd9cF,\x8e\x92', 0x0) write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r2 = socket$inet(0x2, 0x3, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x89e0, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000080), &(0x7f0000000240), 0x2, 0x1) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = socket$inet(0x2, 0x3, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x89e0, 0x0) r5 = socket$inet(0x2, 0x3, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x89e0, 0x0) r6 = socket$inet(0x2, 0x3, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x89e0, 0x0) r7 = socket$inet(0x2, 0x3, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x89e0, 0x0) r8 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000001640), 0x2, 0x0) r9 = io_uring_setup(0x3864, &(0x7f0000001680)={0x0, 0x2775, 0x2, 0x0, 0x11b}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001540)=[{&(0x7f0000000300)="6e1b00ed66322b8d5471adfd06720a6d2c2d894ad1b1a266cc1a0c5a5ccb2421bd1e7d892a61104c7fa1f425e9367ec5da62d5d303a46ff3c8ff715b1cb7cb6732c4755807c81ee0c4c0741856c90d98047f7a4da5e573b70195178b8a0e3a27c91672df7f7b0884e0b55f01056fda172394a90f2ab6df3e694e7a0e072e0d41d7393d0f32ac69ccfe08fe479513a7b5122e414ed83ade723c5c81036dd429198eb95421847b2be1ef7c5fb00396fa942fd555b40991694ec8ff8c92e68c314257decccc00929fba340ffa37bd9a217b4d1068d524f55dab9c5ffe1930f0d20dab119fe98214671ad2281a4066ba78d68a72540f313885291db4eb7315ef0bcabad101bc2d3c3f0acb23b8dff7ec3c3e06f754c0a44597b0b57dc24250cac7c21c13f4d717cf36a815b3244c5ff06904132e411a3609da21f3f473c9bab1247109b9d41e10034fdf726cc7d3aad63062adce2449b62ff65e1890f914ab514327e174550c871d47571a9759528ce2fb6b2f1dc5497035127cfbe135134e065a89f956a0754634106f93b5c965681134cbc8de965c42de1e12fb6696e8b38ffbdde01bb04b2148d52573e347caf641156e681fa2922173bb764f3b92a93075043abe838540955c667071240b954d598c23584ae01087737ea07305f491cd781ac0e691702be5b569a3d9161fe9694a28c908e8b24499ed00b76b9daaf00e71f32577e7a194022a28b41d6d169d18c5149465f8914cb95abc3d1cb6db3ef04d718b37547822c42ed63817c479b7a8347b53d79d5ff58e35718fb898cfc7693bafbcb184f0fa95aa6e069f2549f8eaf51571ae887d8d8638480bb4d6fb270797af9f7daebb8a7ce1bd4bd0c58eff86b6be6f546bbe26bd2984137126f2b51db104b98aaca6efab8081911df0061e49cccc34ebcf29a31ab528d86e0410e51c347867903d369e2560bee2d26f7eedb1c127ff5d5b6855309400d7bb8a6fd2d83168de85dafe210e29f89c2baf3c98190b8d28ce6893b0f7759ad0beec3212c45a9a635d955a13bdf03f7ca8714d8aa4742e2dee27e04866c328a5005a198dbe9363b7835c0936c0c4ceef33cb4ead86090622facc9caa266c79f0b3aa00fd294a076c7332c492df5915f04c16ee98d911c9bf9ca0299c1821da739716deaaa77b4227647787e209f54f43b7d3d93681e1123a2e069322331ad38cba8a985ee8f5c0d042af45abc9c543142f6db6f21444d6b696d16e60d0139272c89208dfca4d78db834942d5f6f4d29ac7967351a687b518e7cbc7ddf985a2748591b9c0cf6e3ed5eec0ee3aa669959b4535d8bbbc4d962635b487edce1cbfd673cc842a3ef5e80873b267ef7377eb1a6f14ddfbb4d49d98fb4a246e5620a6f37d61c28b9e7394867e6eded9e507e42d8588519b23f8266241f4f29cf1db033be23f5a001a9f520f489f7301913be99c89482410ced301cbd625ee2ba97b3b1e2bc6757e238b43c5a5800d32078cdcea15bf3f4d56b56d60b753434b055dfa89f541a7bb11f4d1b0500dcb0f5281c5b389b6ff48f5d0444b0f17bc20cf0aacbbe062c3e7a874068a22cf9a954d5ccff1fad127b124fc8a26c8d4fcff0685025fcb0baca64085d00d0b0ff4328ea64ca937424ab11345a05079e33ed00a67838a32975ddc8d5543679cd8c65c87688c419acf8aa3b6e5e0ec5e6b4d7472ef754971415ddf526bed13d4f03f03ce8b67909c01cc0ae0fd653d7332d82519f78b5d4161cafaacb88d2744a23acfefd8b1c3e3847f0b576aa88056a812f88f0ee05232956d6ecf9c5fb6a0789218fdafbed6aa602c0cc2419eaf6bb1f4a3969113a427f91afc4137b287a6d446fc55a11766cd685e8e8ab0b4112d383004a7a15d9ad647d103a8f119cbf61166003c44d9a3fb43cc4c304021c0d8315531d27b27c60da243bddb5887c7a7194d7ce59efae0862e104af1af970157bf7ac001c64d829bface51fb2c69fd588d66db581b754e76b9a385b709446cad35ab0c546919e3bf16ecf22c566c05c700c548c65aaa3b5d0bcedfbe9f90726d2ffbfa765bf446cb322d729977b5229ca3171639b504a4b727337124282284e543500f1761fd3022a5e0965858d8e986b608ce1aec9152f4b4b3708262d175f30b7f3355914d37559c454f7a9640964044e2b96124a925880a512abb66c3946b27656135bd8631a22f8a6a01ab491262d2a1681a81ac82b804f4ced0decfaed1ca439d1cfb9595c78ff3fc011e3733800b12160c8bcfe22328e3f5fcce545bbfe8ae58dc3f7fbce25544e6eb824f695f4b33e76dbc17b00e31b31291dd245dec9645f6f820bc25a6fbad34d534743c8164f1814ddeb06241da482506698c20519bd96b3952a56b901e75b57988b995797944fe8d1a1ca39abf5ee1c271a17c1c8321955273158a9e21f37754c52ab24207c54857454cee17f3e3516f239d7ef798a21d9c3c15cfaf63cd73f7f4362e93d975dfb6630a35726d56f4dcf8a852ccc48713359e76c3ea519141c6c6c96d4eba68079be1d3e706df40fb355a829e028eb854a9d66e1b67e5eaa396a8799885ab2b34ec9c4d22326e396b6767e8bd453af8bb5fa6dfede382fea1875e0514510b993276cebf7819479b4b67aa9f8edb9204a124ecde02789196b2925b85f5d45101ab079a162a1d0e6106288a32ba1b54eec97980603ea9282ef44a4464ca3233929b9810878a8e058a37e58a46a175b2699823aa7887aa13def01720348232b79c15b012f6a0ae5c6aa5f59a4991c7cfaa1779b4e02a46de7d393a4a38499669ff07334c539cb9af6be426ebc68171bcc7c70ea4c8e8e8e644df7ed821f60b5e74fa39118b8b8953e8857d3c61e4633ee5ca48d047ca4b5f5f824b49fe7053920d4d6de0d9d4ceb9314fe15638369d49b4de6390279f1a3352d972eb7c1f4119a4f20aad7b25439b570eccb82c5fdbd5bb4295eacc6fc7120591c340506e734d0913a7f0f9d3a196f3810358d3f920d03fefc4c30515155e9715e1a741e0d2bd4c65c5ce12670dc9bb521855f0f11c39b236688ecbb859a87963b1719c948dbcbc094b250219429ef7ffd319f2359575d1af962ea54f1a81028b561dbdc6ad87c97524f28c9caf8d08dbbf6c7bf36be00f78552fcfd8f5f24355284404a8dcfab618d39065ee5bf9f00e165fa725dfdc60f828f072fa9867e341199a2848e5623e14a5bf070ac3310c4b480af97291e5caad4dde7c1ba9fe09620e36d1da5da83d73e46574e18aa94121f4edc61af374285fc1836b78f6c23086150b097a3d63910b24af7e3f92fe85c2fd106974b7e337402e1f7d2b88110e4f0303e6c03851b572a6a01f3fdc1e07e18a6c921d33fa603fb11db4e32533d7b947ccc622b388d8dad097ab0bf5565acc6f6446436e8a12f53c33ea794cf86d51fb92ed769c476e9fd3b5b0fe279313e0ca9a2fe1cf86771baf2a12e69c40407e5dd92e43412fa8477e56a7bf97b5cd6a36f5ab9859b129ee6203f5042d46409b3645614f456d8b17126b5aece757f96be05bff20fdcac42f9933ce0f178aed3a537a2ada597277f908b07b0000229fc9cb5f3c9efb4ffb62bf1e46b21da122236b7c8d2b292dfa7ac0447e2b7814a4fefd57c799aa08bfb728c58fbabf07e37b6b2c365c84f27c5bac151f242761a65671dc8c7a37052aa0b0ec976726d6de039b1e0675d22cde7052b9aa067f71968b8b64e74aff1e1bfe42ed6b6b9e3ba1522a88dce5af4048ce1f8bf2839c5683b80f7f03646b67663b6bf836c63f4730cdb7ec83875d137d1ca2b8592d14a4063a0a28f1c94b58890389a02578112c25d7201b08a22ed9991e0ca8fdb47d8fc143d731d24e14801e6c0b836bbc1e2ecbae1177d57d56a517eebd746a02cee89859f027377d89f8a3f4a5de24b39460bbabdd7cef8cdcbad40f559b4d11ae0e89c15445b0bf502b220e27aeff958102aef5e68926ea25c4c41f544bbaf53f267ce190e770f80b39a550aa8f1c741ebb6acd430100a493602092478eb3ebb3b016f9db13521639e4eba44c1e0fb88b0ba3c0f19a2572dd751ad05fb7f65a983222260e9490975a9cda2c4fcfd4540588d3a4c25d3f44f23c920063b7cff515df5d953ff0a3cf5ad79f09518a03e845cddd98c418fa40c7fd738aebe938c8c5c40a2ddd21603b6b9553ab3b1fe4e13f23f30a3df1e82a1a01ca30a4a9df0296180eaf44b3383b9d8f184a3cc08c23e7554809109e5385d6ec5aef04b78e601378fa3a1358bb4408689b5422a7eeb7fa3b3a94ecde9dd4c5f79776aa56dd4b47a84085450c5ebf1254d584396782e952ee8de79a8389f1eff873a064ce6d964b4f6ce4eb9221809b4eb327224a50e73c80c1b327f136b5659750b8bc047c03cc17264a284221fd6f5890b9c6169dca75a1eb6a7405edac88b0def354c81e10da2ad46f202d3820c1d9d7d9efa56a14fcba568da39bc0bac555179a70cefa4d69aa87d0fb89f6e94db1f3bac5f2718ffdf85bc8c2764d27c2d6334c1e71af2b4aec234f7550933146f29d247783515e9fa3c8a54ce39733674a05a664e6266353d5af7f6f253be74935ff0c1e0f147d3e386b38372198e77be55d38d52f43297a6a0d58881302bfed3d28c6e83a7ecda84346b22796df185786853d0c7bd5035b017544bcdea7e92c4ffb2117d0ceee786c7f61a04eae8d98ac73e22c371cff79133164186cd19e710e657f23d08b8cc416fd7e5bc1107726b33d709c8c4d1ed0d4dab2db5f6fc0ad098cf697e0b8116487c303c718cffeb74367e65514274bd8ff6240b024c53dd7aabf05a1545da0128820bbf846175ee586f82c25a99baa3b799ce6741393cbf36ba6c12a8d421908d377cbd2fc2e8a4a6d443b4979dd244014f136dc158c860cae7a806a2e293b36eeac15e99ac271a761c2fddc6edeea91c2cad63add7bf1d041775575393a2bec277971dcae692e24dc3662c3ed05295d9ccdaa29daf0f2bf1befaec3d81888f65703d2718254c9bc61c813b020034392b27123d488d14badab31c05df05d14264f0cb236a508c1ebf67fa0caf6d36507861bc414d9894c1cb1f6b0a2b95a0354c11d41036cf2a78bccfd6936b2319e05bf5111d6170518e0c10760178a4347590a69c690793334b74580364c742bffb9a40d080f25d7e2538dc7a14dd8fd793966e6fcc33915b4364b4a24d40feaa9ef7f6c0c4d19c7b3ad98ad1b777691d72afd2dc4d8abc9f963442462c6a6910e302e1da00ef4f99de2db270b52e64353c62b7e663cc9c11437eaa1cf48893e03660b5dcc4322bb844a7e3bb2a34683daa4e74f6d71fa974147e7dce7237086a3d674f775fbd398b6e01897fb55357c0322b8658f207601b3c9f3670e1f720462741aa6782205b49abc5a853f96017fa3e75b58be076bbb3996b35196a78354b1ead6ce7bd7718d52f7ea039db0de74129d72be53e5adc1053279e9ccdfe6e2d56e621aa655052cdfe5b392e6a4b480d9e24b7279a7b62f5c9f65ff14dced8d9f49cf4f26a437636083b36697071b63a46c3906ae56beb2708ec670f4d969d7768d6bcaff6994d886c39cca6ef45f9bafc0edfdc8cd5d91ed66eb0849a8c49461ac04af0823486b7702ef3bbb427fb7f595f431e4b8ddf3b1e04ac17d1f7a321c52286c2e8a010799bff7f04323a62a518c86c755135a80a00a43ab605b3ef0be5441cec48105c68badeda8067566898f774e3fca71295ee3242453e074335abc1813ee41a4acfd0e614473d23d49ae3a51212f8f13e5765b", 0x1000}, {&(0x7f0000001300)="61ae74eb1065b131929b835c8b7b0d09c7d0e1af41d86448ab2a41a0b12e2d4dc78bb508d1ae6b1de82dd69f80212228aca5f76fd92c72348b28a9cfe940adc74207a7f8128c546f46017801dd08d0265c043901b4ef5682", 0x58}, {&(0x7f0000001380)="f94e560353308eda816b2a87fd1a87e00bce21857613ad336d2b38abadcd6c5b3c6353c105012026fea06f11fed4dfd37672ae6e4b20d4ec0cee6c15cb3f82577d23bc832687306e7e7199a3fc410a90c0463fa8eb0f551df46c8239252f68a0b63ee4091bc4530e4f1ad0f993146fda0e2e38b85f22d6ed161bbb8106a7704bfe2acfd14f6fac0675babd95ee4dbe6bc740be4c30a6c6b88620e8977a2a0b66c135f80313bc5c7b4d1446aeed", 0xad}, {&(0x7f0000001440)="69c1d93731fba8314f90f8b51fa38d32c5a47257f52d38578586b5d0d9437ec2f880c9c529a3fc07b92a8a13fa3e5f2f8a68748930481fa95ae4f3d2eb5691dd448b44c6ed5d43864adf6ee41277b1bdb297915967cde059eaeb8bbdd15af658fff0395aa1040f02ec1fdde9dae2c748e63d480b5156f99008dc8e535102d3983b2116e5a7a9b6a0ffe1ece18aa68a0f3015d7ad82270d628c55bebb3b6f77e5b700d7231a2ea39312ebaaa0515300bc014f0daf9dc4792d9482d84d388ec4402779daaf771024eebd0f08cec160", 0xce}], 0x4, &(0x7f0000001700)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3]}}, @rights={{0x24, 0x1, 0x1, [r5, r1, r0, r0, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r6, r3, r3, r7]}}, @rights={{0x28, 0x1, 0x1, [r1, r0, r8, r3, r0, r9]}}, @rights={{0x18, 0x1, 0x1, [r0, r3]}}], 0xd8, 0x20000000}, 0x4000) 03:53:10 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000f6ffffff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:10 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000018d0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:10 executing program 1: sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/67, 0x4e}, {&(0x7f00000000c0)=""/249, 0xf9}, {&(0x7f0000000300)=""/139, 0xb0}], 0x3, 0xdbf, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x2, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000200), r2) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), r1) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000001c80)={&(0x7f0000001880)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x2}]}]}, 0x1c}}, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000740)=[{&(0x7f0000000480)=""/107, 0x6b}, {&(0x7f00000001c0)=""/40, 0x28}, {&(0x7f0000000240)=""/13, 0xd}, {&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000540)=""/160, 0xa0}, {&(0x7f0000000600)=""/185, 0xb9}, {&(0x7f00000006c0)=""/113, 0x71}], 0x7, 0x9, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f00000003c0)={0x0, 0x7ff, 0x1, 'queue1\x00'}) [ 1121.010813][T16432] loop5: detected capacity change from 0 to 224 03:53:10 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000feffffff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1121.085808][T16450] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 1121.125315][T16454] loop5: detected capacity change from 0 to 224 [ 1121.125533][T16450] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 03:53:10 executing program 2 (fault-call:9 fault-nth:1): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000000000010100008000000000", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fff", 0x15, 0x6000}, {&(0x7f0000010900)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020100089eb70325132510000eb70325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c4531202020202020200089eb70325132510000eb70325105", 0x9b, 0x4800}], 0x0, &(0x7f0000000e00)=ANY=[]) sendto$inet6(r0, &(0x7f0000000440)="665f75a12d0c08a047e8d793b6b6e71cbf44f04f9804d67380290afd62ba5706ad08685d86aec992d5114745b45da8fd8d616a703f978efb1a336b3b5eebf2b54ce76bb03e8ad483803255dcdfe593b1eafe4ee5481d380b", 0x58, 0x0, &(0x7f00000004c0)={0xa, 0x4e21, 0x15, @local, 0x3}, 0x1c) r1 = accept$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000140)) chdir(&(0x7f0000000040)='./file0\x00') getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000380)={'nat\x00', 0x0, 0x3, 0x60, [0xffff, 0x101, 0xf8d9, 0x2, 0x4, 0x40], 0x6, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000300)=""/96}, &(0x7f0000000180)=0x78) r2 = open(&(0x7f00000001c0)='./file1\x00', 0xc200, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x26, &(0x7f0000000400)={@multicast1, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 03:53:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000500000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000000440)={{'\x00', 0x3}, {0x7d56}, 0x2, 0x0, 0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)="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", 0x132, 0x0, &(0x7f0000000240)={0x2, 0x101, {0x0, 0xc, 0x5f, "0209a3e2b616dd378ec00d41f92327989cd697b384c0afee24f412ab9665dca5bdcb4110fdf8359889ca79e67b00a5c2e6c7935e78c643a70a3b09ebe16ea0d5441c1717edeecb4525ff61410a3def21daf8ce28930c48365593fd46cd5c9b", 0x95, "e8ab3a1c7e5c02b9adb225fabbd2e896702cc37412526e9d7b2e5a98332d8dc5fdfb1354d9607c1965f6a34bfcab2ce4d34a09b28322feb7f65796bf11cd15f6bc398cde1e711c0f3c7e65975e61fc612ff82cd3f83cc4e3f0e9f5a1d5748f6ed3802638e5ac7180e0bd74dfcc86b4f808dbc866a6b6ee057694ea720c85955b7d95b7b18c0171203857598a9be73502bdba4ac756"}, 0xe3, "854af54e38212a3fe482b5e316332fc6910691bc45555f39279eb54fa805edf0c79dd9a6374195aae9d35fa5d483576974058038dd2707d895bd9611d168088ae0aaf6b8f6e589bfc40db39a59948409ec07698eced3f311e58808ee0a217d73b999b359d523cac0071cac42e232d26b5e079ee180a83be5389980fcbc1a512d1bb873a23a171fcb610e3b6fa019ac018dcb8bcac9f4dfcadb5a2322ab361d3121f7cf16baabf8ee2a1e386ba46b164c08c9e0fca69e8e68cd5f90af31dc40bf75da8d14712c65fe4c55969119c285331491878bb1c0ac568bfdaaa815cebd2bf78f9c"}, 0x1f0}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000640)={0x153802400, 0x0, 0x0, 0x0, {0x40000}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 03:53:10 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000001920000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:10 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000c0ed000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:10 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x89e0, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) 03:53:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000600000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000100)=@ethtool_per_queue_op={0x1b, 0x5}}) clock_gettime(0x0, &(0x7f0000005640)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005400)=[{{&(0x7f0000000040)=@abs, 0x6e, &(0x7f00000014c0)=[{&(0x7f0000000340)=""/192, 0xc0}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/154, 0x9a}], 0x3, &(0x7f0000001500)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000001580), 0x6e, &(0x7f0000001700)=[{&(0x7f0000001600)=""/3, 0x3}, {&(0x7f0000001640)=""/133, 0x85}], 0x2, &(0x7f0000001740)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001780), 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000001800)=""/218, 0xda}, {&(0x7f0000001900)=""/54, 0x36}, {&(0x7f0000001940)=""/41, 0x29}, {&(0x7f0000001980)=""/156, 0x9c}, {&(0x7f0000001a40)=""/35, 0x23}, {&(0x7f0000001a80)=""/11, 0xb}], 0x6, &(0x7f0000001b40)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}}, {{&(0x7f0000001c00), 0x6e, &(0x7f0000002e40)=[{&(0x7f0000001c80)=""/3, 0x3}, {&(0x7f0000001cc0)=""/34, 0x22}, {&(0x7f0000001d00)=""/250, 0xfa}, {&(0x7f0000001e00)=""/50, 0x32}, {&(0x7f0000001e40)=""/4096, 0x1000}], 0x5, &(0x7f0000002ec0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000002f40)=@abs, 0x6e, &(0x7f00000030c0)=[{&(0x7f0000002fc0)=""/151, 0x97}, {&(0x7f0000003080)=""/48, 0x30}], 0x2, &(0x7f0000003100)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}}, {{&(0x7f0000003180)=@abs, 0x6e, &(0x7f0000003640)=[{&(0x7f0000003200)=""/219, 0xdb}, {&(0x7f0000003300)=""/158, 0x9e}, {&(0x7f00000033c0)=""/224, 0xe0}, {&(0x7f00000034c0)=""/146, 0x92}, {&(0x7f0000003580)=""/179, 0xb3}], 0x5, &(0x7f00000036c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x108}}, {{&(0x7f0000003800)=@abs, 0x6e, &(0x7f0000003980)=[{&(0x7f0000003880)=""/57, 0x39}, {&(0x7f00000038c0)=""/169, 0xa9}], 0x2, &(0x7f00000039c0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xe8}}, {{&(0x7f0000003ac0)=@abs, 0x6e, &(0x7f00000050c0)=[{&(0x7f0000003b40)=""/153, 0x99}, {&(0x7f0000003c00)=""/141, 0x8d}, {&(0x7f0000003cc0)=""/108, 0x6c}, {&(0x7f0000003d40)=""/135, 0x87}, {&(0x7f0000003e00)=""/20, 0x14}, {&(0x7f0000003e40)=""/120, 0x78}, {&(0x7f0000003ec0)=""/164, 0xa4}, {&(0x7f0000003f80)=""/34, 0x22}, {&(0x7f0000003fc0)=""/4096, 0x1000}, {&(0x7f0000004fc0)=""/222, 0xde}], 0xa}}, {{0x0, 0x0, &(0x7f0000005340)=[{&(0x7f0000005180)=""/130, 0x82}, {&(0x7f0000005240)=""/215, 0xd7}], 0x2, &(0x7f0000005380)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x50}}], 0x9, 0x10002, &(0x7f0000005680)={r1, r2+60000000}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), r0) [ 1121.293473][T16486] loop5: detected capacity change from 0 to 224 [ 1121.371925][T16505] FAULT_INJECTION: forcing a failure. [ 1121.371925][T16505] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1121.384973][T16505] CPU: 0 PID: 16505 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1121.393732][T16505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1121.403885][T16505] Call Trace: [ 1121.407148][T16505] dump_stack_lvl+0xb7/0x103 [ 1121.411805][T16505] dump_stack+0x11/0x1a [ 1121.415943][T16505] should_fail+0x23c/0x250 [ 1121.420407][T16505] should_fail_usercopy+0x16/0x20 [ 1121.425459][T16505] _copy_from_user+0x1c/0xd0 [ 1121.430036][T16505] copy_bpf_fprog_from_user+0x90/0x1d0 [ 1121.435499][T16505] sock_setsockopt+0x688/0x1d50 [ 1121.440337][T16505] __sys_setsockopt+0x14f/0x200 [ 1121.445176][T16505] __x64_sys_setsockopt+0x62/0x70 [ 1121.450261][T16505] do_syscall_64+0x3d/0x90 [ 1121.454666][T16505] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1121.460547][T16505] RIP: 0033:0x4665e9 [ 1121.464459][T16505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1121.484052][T16505] RSP: 002b:00007f19dfeb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1121.492467][T16505] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665e9 [ 1121.500425][T16505] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 [ 1121.508382][T16505] RBP: 00007f19dfeb11d0 R08: 0000000000000010 R09: 0000000000000000 [ 1121.516340][T16505] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000001 [ 1121.524391][T16505] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 03:53:10 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000001930000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000040600000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:11 executing program 0: r0 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c) fallocate(r1, 0x3c, 0x3, 0x1) r2 = socket$inet(0x2, 0x3, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x89e0, 0x0) getsockname(r2, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80) unshare(0x2060400) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0xfffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) r3 = socket$nl_generic(0x2, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000200), r3) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r5 = socket$inet(0x2, 0x3, 0x3) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYRESDEC=r5, @ANYRES16=r4, @ANYBLOB="4d7bb00c44030000007c87"], 0x28}}, 0x40000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000000001590f46500000008000300", @ANYRES32=r8], 0x30}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r3, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r4, 0x100, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x5}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x27}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x7f}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x7}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000895}, 0x4000842) 03:53:11 executing program 2 (fault-call:9 fault-nth:2): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:11 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000001960000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:11 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000010000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:11 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x1ff, 0x64000) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x3, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x2, 0x8}, 0x4000, 0x0, 0xa, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) r2 = gettid() clone(0x40808000, 0x0, 0x0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1e) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000040)) ptrace$cont(0x7, r2, 0x0, 0x10001) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x608300, 0x0) ptrace$cont(0x9, r2, 0x4, 0x8) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x4, 0x40, 0xb, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8004, 0x2, @perf_bp={0x0}, 0x4000, 0x8000, 0xfffffff9, 0x7, 0x80000001, 0x8, 0x80, 0x0, 0x6, 0x0, 0x100000000}, r3, 0x8, 0xffffffffffffffff, 0x6ee4ca8bd5713173) 03:53:11 executing program 0: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000002440)={0x0, 0x2007}, 0x4) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000080)="42921bd176a1540e37d0aa7c5c68eea05e71b9b0abb75fd80c23edf51895d02186b11b32f52934d8ce1c6aeac32ab02f7ece7fe4bffb745ddd513d6d65662999a278904ec7fecc2e4bf5dfc06ba90afda19179de807c5224225e2e0242fbda95bb2281cd3f4f7bb87f7b72ef0c782da0ff3eb9206c7783bdfae88a7842b47468b1f865da6491c6955627308d60096650fa0d7ee2f898f20cc97745b67fc1e8de6d003fc89c6146da3c82d0a3cb7ed75a33b310aa12c11c38b40470e6eb966db8cf1f81d49707ed682ee1fe6b4e7f69ef3eb49a582345a07bb13f8c089d6eddb35034e34911a76ff65b85454331c00ceda5a804592acc", 0xf6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4}, 0x14) bind$packet(r1, &(0x7f0000000000)={0x11, 0x18, r4, 0x1, 0x4, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x10) 03:53:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000700000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000800000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1122.137451][T16550] loop5: detected capacity change from 0 to 224 [ 1122.261047][T16574] FAULT_INJECTION: forcing a failure. [ 1122.261047][T16574] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.273662][T16574] CPU: 1 PID: 16574 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1122.282423][T16574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1122.292480][T16574] Call Trace: [ 1122.295744][T16574] dump_stack_lvl+0xb7/0x103 [ 1122.300321][T16574] dump_stack+0x11/0x1a [ 1122.304461][T16574] should_fail+0x23c/0x250 [ 1122.308924][T16574] __should_failslab+0x81/0x90 [ 1122.313671][T16574] should_failslab+0x5/0x20 [ 1122.318161][T16574] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 1122.323930][T16574] ? get_page_from_freelist+0x54e/0x820 [ 1122.329473][T16574] ? __get_vm_area_node+0x11b/0x260 [ 1122.334703][T16574] __get_vm_area_node+0x11b/0x260 [ 1122.339836][T16574] __vmalloc_node_range+0xb7/0x5a0 [ 1122.344931][T16574] ? bpf_prog_alloc_no_stats+0x33/0x200 [ 1122.350462][T16574] ? kstrtoull+0x321/0x360 [ 1122.354865][T16574] ? bpf_prog_alloc_no_stats+0x33/0x200 [ 1122.360394][T16574] __vmalloc+0x5a/0x70 [ 1122.364484][T16574] ? bpf_prog_alloc_no_stats+0x33/0x200 [ 1122.370101][T16574] bpf_prog_alloc_no_stats+0x33/0x200 [ 1122.375470][T16574] bpf_prog_alloc+0x16/0xe0 [ 1122.380011][T16574] __get_filter+0x90/0x210 [ 1122.384427][T16574] sk_attach_filter+0x21/0x260 [ 1122.389176][T16574] ? sock_setsockopt+0x12cd/0x1d50 [ 1122.394288][T16574] sock_setsockopt+0x12de/0x1d50 [ 1122.399209][T16574] __sys_setsockopt+0x14f/0x200 [ 1122.404051][T16574] __x64_sys_setsockopt+0x62/0x70 [ 1122.409064][T16574] do_syscall_64+0x3d/0x90 [ 1122.413465][T16574] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1122.419350][T16574] RIP: 0033:0x4665e9 [ 1122.423227][T16574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1122.442819][T16574] RSP: 002b:00007f19dfeb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1122.451217][T16574] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665e9 [ 1122.459171][T16574] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 [ 1122.467138][T16574] RBP: 00007f19dfeb11d0 R08: 0000000000000010 R09: 0000000000000000 [ 1122.475173][T16574] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000001 [ 1122.483127][T16574] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 [ 1122.491134][T16574] syz-executor.2: vmalloc error: size 4096, vm_struct allocation failed, mode:0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 1122.507061][T16574] CPU: 1 PID: 16574 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1122.515848][T16574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1122.525885][T16574] Call Trace: [ 1122.529147][T16574] dump_stack_lvl+0xb7/0x103 [ 1122.533727][T16574] dump_stack+0x11/0x1a [ 1122.537864][T16574] warn_alloc+0x105/0x160 [ 1122.542182][T16574] __vmalloc_node_range+0x20f/0x5a0 [ 1122.547362][T16574] ? kstrtoull+0x321/0x360 [ 1122.551785][T16574] ? bpf_prog_alloc_no_stats+0x33/0x200 [ 1122.557329][T16574] __vmalloc+0x5a/0x70 [ 1122.561381][T16574] ? bpf_prog_alloc_no_stats+0x33/0x200 [ 1122.566915][T16574] bpf_prog_alloc_no_stats+0x33/0x200 [ 1122.572347][T16574] bpf_prog_alloc+0x16/0xe0 [ 1122.576832][T16574] __get_filter+0x90/0x210 [ 1122.581238][T16574] sk_attach_filter+0x21/0x260 [ 1122.585998][T16574] ? sock_setsockopt+0x12cd/0x1d50 [ 1122.591093][T16574] sock_setsockopt+0x12de/0x1d50 [ 1122.596016][T16574] __sys_setsockopt+0x14f/0x200 [ 1122.600853][T16574] __x64_sys_setsockopt+0x62/0x70 [ 1122.605907][T16574] do_syscall_64+0x3d/0x90 [ 1122.610311][T16574] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1122.616199][T16574] RIP: 0033:0x4665e9 [ 1122.620079][T16574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1122.639674][T16574] RSP: 002b:00007f19dfeb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1122.648074][T16574] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665e9 [ 1122.656035][T16574] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 [ 1122.663990][T16574] RBP: 00007f19dfeb11d0 R08: 0000000000000010 R09: 0000000000000000 [ 1122.672007][T16574] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000001 [ 1122.679996][T16574] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 [ 1122.688005][T16574] Mem-Info: [ 1122.691120][T16574] active_anon:5457 inactive_anon:172449 isolated_anon:0 [ 1122.691120][T16574] active_file:9305 inactive_file:41128 isolated_file:0 [ 1122.691120][T16574] unevictable:0 dirty:118 writeback:0 [ 1122.691120][T16574] slab_reclaimable:6184 slab_unreclaimable:28730 [ 1122.691120][T16574] mapped:65199 shmem:12728 pagetables:91998 bounce:0 [ 1122.691120][T16574] free:1572342 free_pcp:2393 free_cma:0 [ 1122.728525][T16574] Node 0 active_anon:21828kB inactive_anon:689796kB active_file:37220kB inactive_file:164512kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:260796kB dirty:472kB writeback:0kB shmem:50912kB writeback_tmp:0kB kernel_stack:55280kB pagetables:367992kB all_unreclaimable? no [ 1122.755515][T16574] Node 0 DMA free:15360kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1122.781432][T16574] lowmem_reserve[]: 0 2942 7920 7920 [ 1122.786732][T16574] Node 0 DMA32 free:3014332kB min:4224kB low:7236kB high:10248kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:3017344kB mlocked:0kB bounce:0kB free_pcp:3012kB local_pcp:2960kB free_cma:0kB [ 1122.814467][T16574] lowmem_reserve[]: 0 0 4978 4978 [ 1122.819514][T16574] Node 0 Normal free:3259676kB min:7152kB low:12248kB high:17344kB reserved_highatomic:0KB active_anon:21828kB inactive_anon:689796kB active_file:37220kB inactive_file:164512kB unevictable:0kB writepending:472kB present:5242880kB managed:5098028kB mlocked:0kB bounce:0kB free_pcp:6536kB local_pcp:5060kB free_cma:0kB [ 1122.849264][T16574] lowmem_reserve[]: 0 0 0 0 [ 1122.853766][T16574] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 1122.866569][T16574] Node 0 DMA32: 3*4kB (M) 2*8kB (M) 4*16kB (M) 3*32kB (M) 2*64kB (M) 3*128kB (M) 2*256kB (M) 3*512kB (M) 3*1024kB (M) 1*2048kB (M) 734*4096kB (M) = 3014332kB [ 1122.882529][T16574] Node 0 Normal: 831*4kB (UM) 168*8kB (UM) 2162*16kB (UME) 1008*32kB (UME) 989*64kB (UM) 359*128kB (UME) 13*256kB (UM) 7*512kB (UME) 4*1024kB (UME) 2*2048kB (UE) 748*4096kB (UM) = 3259676kB [ 1122.901286][T16574] Node 0 hugepages_total=8 hugepages_free=0 hugepages_surp=4 hugepages_size=2048kB 03:53:12 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000002960000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:12 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000040000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1122.910565][T16574] 34084 total pagecache pages [ 1122.915231][T16574] 0 pages in swap cache [ 1122.919361][T16574] Swap cache stats: add 0, delete 0, find 0/0 [ 1122.925424][T16574] Free swap = 0kB [ 1122.929121][T16574] Total swap = 0kB [ 1122.932820][T16574] 2097051 pages RAM [ 1122.936633][T16574] 0 pages HighMem/MovableOnly [ 1122.941296][T16574] 64368 pages reserved 03:53:12 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000003740)=[{&(0x7f0000002240)="f9", 0x1}, {&(0x7f0000002680)="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", 0xffd, 0x4}], 0x0, 0x0) 03:53:12 executing program 2 (fault-call:9 fault-nth:3): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:12 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000900000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:12 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000001970000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1123.088025][ C1] print_req_error: 380 callbacks suppressed [ 1123.088056][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1123.104934][ C1] buffer_io_error: 380 callbacks suppressed [ 1123.110842][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:12 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000003740)=[{&(0x7f0000002240)="f9", 0x1}, {&(0x7f0000002680)="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", 0xffd, 0x4}], 0x0, 0x0) [ 1123.190945][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1123.201855][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1123.213053][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1123.223948][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1123.268859][T16612] FAULT_INJECTION: forcing a failure. [ 1123.268859][T16612] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.281640][T16612] CPU: 0 PID: 16612 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1123.290388][T16612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1123.300425][T16612] Call Trace: [ 1123.303690][T16612] dump_stack_lvl+0xb7/0x103 [ 1123.308276][T16612] dump_stack+0x11/0x1a [ 1123.312414][T16612] should_fail+0x23c/0x250 [ 1123.316820][T16612] __should_failslab+0x81/0x90 [ 1123.321588][T16612] should_failslab+0x5/0x20 [ 1123.326091][T16612] kmem_cache_alloc_node+0x58/0x2b0 [ 1123.331284][T16612] ? alloc_vmap_area+0x12f/0x1340 [ 1123.336339][T16612] alloc_vmap_area+0x12f/0x1340 [ 1123.341280][T16612] ? should_fail+0xd6/0x250 [ 1123.345773][T16612] ? kmem_cache_alloc_node_trace+0x1f0/0x2e0 [ 1123.351744][T16612] __get_vm_area_node+0x165/0x260 [ 1123.356769][T16612] __vmalloc_node_range+0xb7/0x5a0 [ 1123.361888][T16612] ? bpf_prog_alloc_no_stats+0x33/0x200 [ 1123.367445][T16612] ? kstrtoull+0x321/0x360 [ 1123.371850][T16612] ? bpf_prog_alloc_no_stats+0x33/0x200 [ 1123.377381][T16612] __vmalloc+0x5a/0x70 [ 1123.381431][T16612] ? bpf_prog_alloc_no_stats+0x33/0x200 [ 1123.386960][T16612] bpf_prog_alloc_no_stats+0x33/0x200 [ 1123.392322][T16612] bpf_prog_alloc+0x16/0xe0 [ 1123.396820][T16612] __get_filter+0x90/0x210 [ 1123.401225][T16612] sk_attach_filter+0x21/0x260 [ 1123.405998][T16612] ? sock_setsockopt+0x12cd/0x1d50 [ 1123.411092][T16612] sock_setsockopt+0x12de/0x1d50 [ 1123.416027][T16612] __sys_setsockopt+0x14f/0x200 [ 1123.420867][T16612] __x64_sys_setsockopt+0x62/0x70 [ 1123.425892][T16612] do_syscall_64+0x3d/0x90 [ 1123.430298][T16612] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1123.436181][T16612] RIP: 0033:0x4665e9 [ 1123.440058][T16612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1123.459764][T16612] RSP: 002b:00007f19dfeb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1123.468198][T16612] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665e9 [ 1123.476154][T16612] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 [ 1123.484111][T16612] RBP: 00007f19dfeb11d0 R08: 0000000000000010 R09: 0000000000000000 [ 1123.492068][T16612] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000001 [ 1123.500028][T16612] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 03:53:12 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000a00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_retopts={{0x14, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x3e}]}}}], 0x18}}], 0x1, 0x0) 03:53:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000019a0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:13 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000b00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1123.672966][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1123.683898][ C0] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:13 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000003740)=[{&(0x7f0000002240)="f9", 0x1}, {&(0x7f0000002680)="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", 0xffd, 0x4}], 0x0, 0x0) [ 1123.724896][T16615] loop5: detected capacity change from 0 to 224 03:53:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000680)={0x2, &(0x7f0000000640)=[{0x35, 0x0, 0x2}, {}]}) [ 1123.771112][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1123.782023][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1123.790696][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1123.801607][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:13 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000c00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000039a0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1123.830836][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1123.841736][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1123.850610][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1123.861486][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1123.879327][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1123.890211][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1123.898198][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1123.909073][ C0] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:13 executing program 2 (fault-call:9 fault-nth:4): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:13 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000ffffffffffff070000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:13 executing program 1: select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x0, 0x2710}) 03:53:13 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000003740)=[{&(0x7f0000002240)="f9", 0x1}, {&(0x7f0000002680)="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", 0xffd, 0x4}], 0x0, 0x0) 03:53:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000019b0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:13 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000d00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001440)={&(0x7f0000001280), 0xc, &(0x7f0000001400)={&(0x7f0000001340)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}]}, 0x4ed336bd051a2b8d}}, 0x0) 03:53:13 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000e00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) write$vga_arbiter(r2, 0x0, 0x0) 03:53:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000029c0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1124.044610][T16669] loop5: detected capacity change from 0 to 224 [ 1124.154238][T16684] FAULT_INJECTION: forcing a failure. [ 1124.154238][T16684] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.166868][T16684] CPU: 0 PID: 16684 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1124.175624][T16684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1124.185687][T16684] Call Trace: [ 1124.188954][T16684] dump_stack_lvl+0xb7/0x103 [ 1124.193548][T16684] dump_stack+0x11/0x1a [ 1124.197741][T16684] should_fail+0x23c/0x250 [ 1124.202154][T16684] __should_failslab+0x81/0x90 [ 1124.206917][T16684] should_failslab+0x5/0x20 [ 1124.211408][T16684] kmem_cache_alloc_node+0x58/0x2b0 [ 1124.216618][T16684] ? alloc_vmap_area+0x202/0x1340 [ 1124.221677][T16684] alloc_vmap_area+0x202/0x1340 [ 1124.226576][T16684] ? kmem_cache_alloc_node_trace+0x1f0/0x2e0 [ 1124.232543][T16684] __get_vm_area_node+0x165/0x260 [ 1124.237575][T16684] __vmalloc_node_range+0xb7/0x5a0 [ 1124.242670][T16684] ? bpf_prog_alloc_no_stats+0x33/0x200 [ 1124.248247][T16684] ? kstrtoull+0x321/0x360 [ 1124.252654][T16684] ? bpf_prog_alloc_no_stats+0x33/0x200 [ 1124.258184][T16684] __vmalloc+0x5a/0x70 [ 1124.262234][T16684] ? bpf_prog_alloc_no_stats+0x33/0x200 [ 1124.267808][T16684] bpf_prog_alloc_no_stats+0x33/0x200 [ 1124.273175][T16684] bpf_prog_alloc+0x16/0xe0 [ 1124.277661][T16684] __get_filter+0x90/0x210 [ 1124.282066][T16684] sk_attach_filter+0x21/0x260 [ 1124.286815][T16684] ? sock_setsockopt+0x12cd/0x1d50 [ 1124.291911][T16684] sock_setsockopt+0x12de/0x1d50 [ 1124.296864][T16684] __sys_setsockopt+0x14f/0x200 [ 1124.301717][T16684] __x64_sys_setsockopt+0x62/0x70 [ 1124.306740][T16684] do_syscall_64+0x3d/0x90 [ 1124.311224][T16684] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1124.317176][T16684] RIP: 0033:0x4665e9 [ 1124.321068][T16684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1124.340660][T16684] RSP: 002b:00007f19dfeb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1124.349067][T16684] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665e9 [ 1124.357021][T16684] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 [ 1124.364976][T16684] RBP: 00007f19dfeb11d0 R08: 0000000000000010 R09: 0000000000000000 [ 1124.372931][T16684] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000001 [ 1124.380946][T16684] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 03:53:13 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000080000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:14 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000f00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1124.619518][T16701] loop5: detected capacity change from 0 to 224 03:53:14 executing program 2 (fault-call:9 fault-nth:5): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:14 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000001a00000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:14 executing program 1: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@context={'context', 0x3d, 'staff_u'}, 0xa}]}) 03:53:14 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000c0000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:14 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002d40)=[{{&(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{0x0, 0x0, &(0x7f00000014c0)=[{0x0}, {&(0x7f00000002c0)="0e", 0x1}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x3, 0x8040) 03:53:14 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000001000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x18, &(0x7f0000000340)="604fd1b8", 0x4) 03:53:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @broadcast}}) [ 1124.894615][T16718] loop5: detected capacity change from 0 to 224 [ 1125.014752][T16742] FAULT_INJECTION: forcing a failure. [ 1125.014752][T16742] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.027383][T16742] CPU: 0 PID: 16742 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1125.036216][T16742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1125.046257][T16742] Call Trace: [ 1125.049522][T16742] dump_stack_lvl+0xb7/0x103 [ 1125.054105][T16742] dump_stack+0x11/0x1a [ 1125.058250][T16742] should_fail+0x23c/0x250 [ 1125.062659][T16742] __should_failslab+0x81/0x90 [ 1125.067406][T16742] should_failslab+0x5/0x20 [ 1125.071892][T16742] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 1125.077604][T16742] ? __kmalloc_node+0x30/0x40 [ 1125.082375][T16742] ? __get_vm_area_node+0x226/0x260 [ 1125.087563][T16742] __kmalloc_node+0x30/0x40 [ 1125.092102][T16742] __vmalloc_node_range+0x23a/0x5a0 [ 1125.097284][T16742] ? kstrtoull+0x321/0x360 [ 1125.101689][T16742] ? bpf_prog_alloc_no_stats+0x33/0x200 [ 1125.107255][T16742] __vmalloc+0x5a/0x70 [ 1125.111321][T16742] ? bpf_prog_alloc_no_stats+0x33/0x200 [ 1125.116849][T16742] bpf_prog_alloc_no_stats+0x33/0x200 [ 1125.122242][T16742] bpf_prog_alloc+0x16/0xe0 [ 1125.126828][T16742] __get_filter+0x90/0x210 [ 1125.131301][T16742] sk_attach_filter+0x21/0x260 [ 1125.136050][T16742] ? sock_setsockopt+0x12cd/0x1d50 [ 1125.141145][T16742] sock_setsockopt+0x12de/0x1d50 [ 1125.146067][T16742] __sys_setsockopt+0x14f/0x200 [ 1125.150952][T16742] __x64_sys_setsockopt+0x62/0x70 [ 1125.155980][T16742] do_syscall_64+0x3d/0x90 [ 1125.160387][T16742] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1125.166290][T16742] RIP: 0033:0x4665e9 [ 1125.170167][T16742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1125.189761][T16742] RSP: 002b:00007f19dfeb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1125.198173][T16742] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665e9 [ 1125.206141][T16742] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 [ 1125.214095][T16742] RBP: 00007f19dfeb11d0 R08: 0000000000000010 R09: 0000000000000000 [ 1125.222051][T16742] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000001 [ 1125.230012][T16742] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 03:53:14 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000001a10000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:14 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000001100000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:14 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @broadcast}}) [ 1125.472570][T16760] loop5: detected capacity change from 0 to 224 03:53:15 executing program 2 (fault-call:9 fault-nth:6): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:15 executing program 1: eventfd2(0x0, 0x8e6495d69bb1fdb8) 03:53:15 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000001200000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:15 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000001a80000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @broadcast}}) 03:53:15 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000100000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:15 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000002000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:15 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000200000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1125.792565][T16782] loop5: detected capacity change from 0 to 224 03:53:15 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000102000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @broadcast}}) 03:53:15 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000001a90000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:15 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x0) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000b40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14, 0x0, 0x4a353489401aa6fb}, 0x14}}, 0x0) [ 1125.936978][T16812] FAULT_INJECTION: forcing a failure. [ 1125.936978][T16812] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1125.950203][T16812] CPU: 1 PID: 16812 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1125.958959][T16812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1125.968998][T16812] Call Trace: [ 1125.972277][T16812] dump_stack_lvl+0xb7/0x103 [ 1125.976856][T16812] dump_stack+0x11/0x1a [ 1125.981075][T16812] should_fail+0x23c/0x250 [ 1125.985560][T16812] __alloc_pages+0x102/0x320 [ 1125.990200][T16812] __alloc_pages_bulk+0x284/0x700 [ 1125.995210][T16812] ? kmem_cache_alloc_node_trace+0x1f0/0x2e0 [ 1126.001179][T16812] ? __kmalloc_node+0x30/0x40 [ 1126.005862][T16812] __vmalloc_node_range+0x2ef/0x5a0 [ 1126.011044][T16812] ? bpf_prog_alloc_no_stats+0x33/0x200 [ 1126.016575][T16812] __vmalloc+0x5a/0x70 [ 1126.020629][T16812] ? bpf_prog_alloc_no_stats+0x33/0x200 [ 1126.026156][T16812] bpf_prog_alloc_no_stats+0x33/0x200 [ 1126.031520][T16812] bpf_prog_alloc+0x16/0xe0 [ 1126.036004][T16812] __get_filter+0x90/0x210 [ 1126.040415][T16812] sk_attach_filter+0x21/0x260 [ 1126.045219][T16812] ? sock_setsockopt+0x12cd/0x1d50 [ 1126.050388][T16812] sock_setsockopt+0x12de/0x1d50 [ 1126.055311][T16812] __sys_setsockopt+0x14f/0x200 [ 1126.060151][T16812] __x64_sys_setsockopt+0x62/0x70 [ 1126.065271][T16812] do_syscall_64+0x3d/0x90 [ 1126.069674][T16812] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1126.075584][T16812] RIP: 0033:0x4665e9 [ 1126.079516][T16812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1126.099133][T16812] RSP: 002b:00007f19dfeb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1126.107531][T16812] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665e9 [ 1126.115490][T16812] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 [ 1126.123446][T16812] RBP: 00007f19dfeb11d0 R08: 0000000000000010 R09: 0000000000000000 [ 1126.131403][T16812] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000001 [ 1126.139358][T16812] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 [ 1126.250128][T16816] loop5: detected capacity change from 0 to 224 03:53:16 executing program 2 (fault-call:9 fault-nth:7): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000002200000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:16 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000040200000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:16 executing program 0: syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x100082) 03:53:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000680)={0x3, &(0x7f0000000640)=[{}, {0x28}, {0x6}]}) 03:53:16 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000003ec0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000002500000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:16 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/thermal', 0x1a10c1, 0x0) [ 1126.708374][T16860] loop5: detected capacity change from 0 to 224 [ 1126.817701][T16876] FAULT_INJECTION: forcing a failure. [ 1126.817701][T16876] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1126.830763][T16876] CPU: 0 PID: 16876 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1126.839519][T16876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.849554][T16876] Call Trace: [ 1126.852819][T16876] dump_stack_lvl+0xb7/0x103 [ 1126.857399][T16876] dump_stack+0x11/0x1a [ 1126.861588][T16876] should_fail+0x23c/0x250 [ 1126.866008][T16876] should_fail_usercopy+0x16/0x20 [ 1126.871045][T16876] _copy_from_user+0x1c/0xd0 [ 1126.875726][T16876] __get_filter+0xc7/0x210 [ 1126.880139][T16876] sk_attach_filter+0x21/0x260 [ 1126.884957][T16876] ? sock_setsockopt+0x12cd/0x1d50 [ 1126.890055][T16876] sock_setsockopt+0x12de/0x1d50 [ 1126.894980][T16876] __sys_setsockopt+0x14f/0x200 [ 1126.899818][T16876] __x64_sys_setsockopt+0x62/0x70 [ 1126.904842][T16876] do_syscall_64+0x3d/0x90 [ 1126.909250][T16876] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1126.915230][T16876] RIP: 0033:0x4665e9 [ 1126.919128][T16876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1126.938743][T16876] RSP: 002b:00007f19dfeb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1126.947192][T16876] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665e9 [ 1126.955195][T16876] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 03:53:16 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000300000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000003f00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1126.963148][T16876] RBP: 00007f19dfeb11d0 R08: 0000000000000010 R09: 0000000000000000 [ 1126.971119][T16876] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000001 [ 1126.979110][T16876] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 03:53:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x60, 0x0, 0x0) 03:53:16 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000018ed0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1127.207833][T16894] loop5: detected capacity change from 0 to 224 03:53:16 executing program 2 (fault-call:9 fault-nth:8): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:16 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x19, &(0x7f0000000340)='`', 0x1) 03:53:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000004000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:16 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0x200}]) 03:53:16 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000c0ed0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:16 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000400000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000008004000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:17 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8901, &(0x7f0000000180)={'bridge_slave_1\x00', 0x0}) 03:53:17 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='huge=within_size']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f0000000100)={0x6, 0x0, 0x0, 0x2007fff, 0x0, 0x1000000}) [ 1127.576868][T16917] loop5: detected capacity change from 0 to 224 [ 1127.686725][T16935] FAULT_INJECTION: forcing a failure. [ 1127.686725][T16935] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1127.699944][T16935] CPU: 1 PID: 16935 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1127.708695][T16935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1127.718737][T16935] Call Trace: [ 1127.721999][T16935] dump_stack_lvl+0xb7/0x103 [ 1127.726581][T16935] dump_stack+0x11/0x1a [ 1127.730730][T16935] should_fail+0x23c/0x250 [ 1127.735135][T16935] should_fail_usercopy+0x16/0x20 [ 1127.740150][T16935] _copy_from_user+0x1c/0xd0 [ 1127.744749][T16935] __get_filter+0xc7/0x210 [ 1127.749171][T16935] sk_attach_filter+0x21/0x260 [ 1127.753926][T16935] ? sock_setsockopt+0x12cd/0x1d50 [ 1127.759025][T16935] sock_setsockopt+0x12de/0x1d50 [ 1127.764026][T16935] __sys_setsockopt+0x14f/0x200 [ 1127.768915][T16935] __x64_sys_setsockopt+0x62/0x70 [ 1127.773929][T16935] do_syscall_64+0x3d/0x90 [ 1127.778351][T16935] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1127.784255][T16935] RIP: 0033:0x4665e9 [ 1127.788183][T16935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1127.807873][T16935] RSP: 002b:00007f19dfeb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1127.816271][T16935] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665e9 [ 1127.824235][T16935] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 [ 1127.832193][T16935] RBP: 00007f19dfeb11d0 R08: 0000000000000010 R09: 0000000000000000 [ 1127.840210][T16935] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000001 [ 1127.848185][T16935] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 03:53:17 executing program 0: perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='huge=within_size']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f0000000100)={0x6, 0x0, 0x0, 0x2007fff, 0x0, 0x1000000}) 03:53:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000018ef0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1128.030098][T16937] tmpfs: Unsupported parameter 'huge' [ 1128.045513][T16933] tmpfs: Unsupported parameter 'huge' 03:53:17 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000500000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1128.076382][T16947] tmpfs: Unsupported parameter 'huge' [ 1128.112568][T16947] tmpfs: Unsupported parameter 'huge' [ 1128.129350][T16958] loop5: detected capacity change from 0 to 224 [ 1128.153573][ C1] print_req_error: 229 callbacks suppressed [ 1128.153584][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1128.170352][ C1] buffer_io_error: 227 callbacks suppressed [ 1128.170362][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1128.186502][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1128.197455][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1128.205648][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1128.216565][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1128.224406][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1128.235244][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1128.243112][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1128.253959][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1128.261871][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1128.272716][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1128.280669][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1128.291541][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1128.299461][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1128.310312][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1128.318177][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1128.329030][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1128.337006][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1128.347869][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:17 executing program 2 (fault-call:9 fault-nth:9): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000003fa0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000004800000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:17 executing program 1: r0 = syz_io_uring_setup(0x773, &(0x7f0000001500), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ee7000/0x4000)=nil, &(0x7f00000014c0)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000180)=0x307c, 0x0, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='sched\x00') syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0) preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) io_uring_enter(r0, 0x450e, 0x0, 0x0, 0x0, 0x0) 03:53:17 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xbc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 03:53:17 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000600000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f0000001a00)=[{{&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80, 0x0, 0x0, &(0x7f0000000240)=[{0x28, 0x29, 0x2, "2b07df2fd0846bc0964f4ffde3d917e302"}], 0x28}}], 0x1, 0x0) 03:53:17 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000040600000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000003fc0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1128.455873][T16980] loop5: detected capacity change from 0 to 224 [ 1128.567089][T17001] loop5: detected capacity change from 0 to 224 [ 1128.574476][T17002] FAULT_INJECTION: forcing a failure. [ 1128.574476][T17002] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.587116][T17002] CPU: 1 PID: 17002 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1128.595862][T17002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1128.605907][T17002] Call Trace: [ 1128.609208][T17002] dump_stack_lvl+0xb7/0x103 [ 1128.613786][T17002] dump_stack+0x11/0x1a [ 1128.617947][T17002] should_fail+0x23c/0x250 [ 1128.622436][T17002] __should_failslab+0x81/0x90 [ 1128.627183][T17002] ? __get_filter+0x165/0x210 [ 1128.631848][T17002] should_failslab+0x5/0x20 [ 1128.636343][T17002] kmem_cache_alloc_trace+0x49/0x310 [ 1128.641627][T17002] __get_filter+0x165/0x210 [ 1128.646154][T17002] sk_attach_filter+0x21/0x260 [ 1128.650903][T17002] ? sock_setsockopt+0x12cd/0x1d50 [ 1128.655998][T17002] sock_setsockopt+0x12de/0x1d50 [ 1128.660921][T17002] __sys_setsockopt+0x14f/0x200 [ 1128.665776][T17002] __x64_sys_setsockopt+0x62/0x70 [ 1128.670785][T17002] do_syscall_64+0x3d/0x90 [ 1128.675187][T17002] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1128.681069][T17002] RIP: 0033:0x4665e9 [ 1128.684994][T17002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1128.704585][T17002] RSP: 002b:00007f19dfeb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1128.713001][T17002] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665e9 [ 1128.721040][T17002] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 [ 1128.728994][T17002] RBP: 00007f19dfeb11d0 R08: 0000000000000010 R09: 0000000000000000 [ 1128.736950][T17002] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000002 [ 1128.744957][T17002] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 03:53:18 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs(0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x39}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x2ffff, 0x0) 03:53:18 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x1, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20, 0x0, 0x0, 0x6f89}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x0, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080, 0x3}, 0x100) write$binfmt_elf64(r1, &(0x7f0000000600)=ANY=[], 0xfc30) 03:53:18 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000700000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1128.967662][T17018] loop5: detected capacity change from 0 to 224 03:53:18 executing program 2 (fault-call:9 fault-nth:10): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:18 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000004c00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:18 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000fff0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:18 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000800000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:18 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000006000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1129.335174][T17032] loop5: detected capacity change from 0 to 224 03:53:18 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000040200002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1129.437360][T17050] FAULT_INJECTION: forcing a failure. [ 1129.437360][T17050] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.449974][T17050] CPU: 0 PID: 17050 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1129.458737][T17050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1129.468785][T17050] Call Trace: [ 1129.472051][T17050] dump_stack_lvl+0xb7/0x103 [ 1129.476631][T17050] dump_stack+0x11/0x1a [ 1129.480776][T17050] should_fail+0x23c/0x250 [ 1129.485184][T17050] ? __get_filter+0x1ad/0x210 [ 1129.489849][T17050] __should_failslab+0x81/0x90 [ 1129.494597][T17050] should_failslab+0x5/0x20 [ 1129.499106][T17050] __kmalloc_track_caller+0x64/0x340 [ 1129.504440][T17050] ? kmem_cache_alloc_trace+0x20f/0x310 [ 1129.509975][T17050] kmemdup+0x21/0x50 [ 1129.513856][T17050] __get_filter+0x1ad/0x210 [ 1129.518365][T17050] sk_attach_filter+0x21/0x260 [ 1129.523120][T17050] ? sock_setsockopt+0x12cd/0x1d50 [ 1129.528264][T17050] sock_setsockopt+0x12de/0x1d50 [ 1129.533201][T17050] __sys_setsockopt+0x14f/0x200 [ 1129.538109][T17050] __x64_sys_setsockopt+0x62/0x70 [ 1129.543139][T17050] do_syscall_64+0x3d/0x90 [ 1129.547608][T17050] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1129.553490][T17050] RIP: 0033:0x4665e9 [ 1129.557369][T17050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1129.576958][T17050] RSP: 002b:00007f19dfeb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1129.585391][T17050] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665e9 [ 1129.593348][T17050] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 [ 1129.601383][T17050] RBP: 00007f19dfeb11d0 R08: 0000000000000010 R09: 0000000000000000 [ 1129.609337][T17050] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000002 [ 1129.617325][T17050] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 03:53:19 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000900000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:19 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000ffff0300002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:19 executing program 0: memfd_create(&(0x7f0000000540)='/s\xcb\x9cF2\x1d\b\x00\xca\xdc[\x17\x8b\xb2\xf7W\xf0hW\xdd\xca\xc8k\xc0\xa5velindf\r(\x90\xe0\xe0\r\xa6R\xb4\xb8\xa1\x98\xb43\xa6,\xa6<\x13\xfe\x04\x00\x01\xbd\x96:\xe2\x13\x02\xfaw\xaa\xef\x96\xfbi\xf8\x00\bbQ\xd8gC\xb2-\xa1\x06\x00\x00\x00\xe93\xf2\xd6\x03\'\xaa(\x8f\xaf\f7\n\xcf\xaf\xd6\x1fK\xe0\xf3g\x81\xf3o$\x03\x89\xf7\xb6\xed\xd0\xd2\x18j\x8f\x9b\xd1\x8a\xda\\;\xb6\xf4\'y\x17?\xc5\x90\xcc\xe9\xdc\xa7\a\xe2J8x\xad/\xba\xb1mJ\x7f\xe4m\xe6T\xe9\x00\x00\x00\x00Y\x92$O_\xf6\xb6\x1ce\xd0R\xcf\x1c\xbd\x03\x9a\xca\xc1_\xfb\xd0n\xc0\xc6\x04\xa8\x9c\xf5\xa7\xde\xf8&5\xefD\x04\x160\xafy\x02\\\x15F\x0f\f:\xae\xabm\x8f\xaeh\x8c~8\x9f\xc8\xedO\x00\xbf\x1d\xb1\x84', 0x0) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x79d0, &(0x7f0000000000)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x19, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 03:53:19 executing program 1: r0 = syz_io_uring_setup(0x773, &(0x7f0000001500), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ee7000/0x4000)=nil, &(0x7f00000014c0)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x5}, 0x0) io_uring_enter(r0, 0x450e, 0x0, 0x0, 0x0, 0x0) 03:53:19 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000400002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000026400000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1129.923054][T17078] loop5: detected capacity change from 0 to 224 03:53:19 executing program 2 (fault-call:9 fault-nth:11): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:19 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xbc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) ptrace$peeksig(0x4209, r1, &(0x7f0000000700)={0x0, 0x1, 0x2}, &(0x7f0000001480)=[{}, {}]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:53:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0043, 0x0) flock(r0, 0x0) 03:53:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000026500000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:19 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000020400002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:19 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000a00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:19 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r1, 0x2) flock(r0, 0x2) 03:53:19 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000ffff1f00002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1130.210289][T17110] loop5: detected capacity change from 0 to 224 03:53:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x50, 0x1, 0x1, 0x801, 0x0, 0x0, {0xa}, [@CTA_TUPLE_REPLY={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}]}]}, 0x50}}, 0x0) [ 1130.340560][T17134] FAULT_INJECTION: forcing a failure. [ 1130.340560][T17134] name failslab, interval 1, probability 0, space 0, times 0 [ 1130.353274][T17134] CPU: 0 PID: 17134 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1130.362026][T17134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1130.372070][T17134] Call Trace: [ 1130.375335][T17134] dump_stack_lvl+0xb7/0x103 [ 1130.379977][T17134] dump_stack+0x11/0x1a [ 1130.384125][T17134] should_fail+0x23c/0x250 [ 1130.388564][T17134] ? kmalloc_array+0x2d/0x40 [ 1130.393139][T17134] __should_failslab+0x81/0x90 [ 1130.397889][T17134] should_failslab+0x5/0x20 [ 1130.402384][T17134] __kmalloc+0x66/0x340 [ 1130.406529][T17134] ? finish_task_switch+0xce/0x290 [ 1130.411627][T17134] kmalloc_array+0x2d/0x40 [ 1130.416060][T17134] bpf_prepare_filter+0x3de/0xaf0 [ 1130.421083][T17134] __get_filter+0x1d4/0x210 [ 1130.425572][T17134] sk_attach_filter+0x21/0x260 [ 1130.430391][T17134] ? sock_setsockopt+0x12cd/0x1d50 [ 1130.435507][T17134] sock_setsockopt+0x12de/0x1d50 [ 1130.440525][T17134] __sys_setsockopt+0x14f/0x200 [ 1130.445668][T17134] __x64_sys_setsockopt+0x62/0x70 [ 1130.450697][T17134] do_syscall_64+0x3d/0x90 [ 1130.455210][T17134] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1130.461205][T17134] RIP: 0033:0x4665e9 [ 1130.465086][T17134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1130.484680][T17134] RSP: 002b:00007f19dfeb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1130.493097][T17134] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665e9 [ 1130.501053][T17134] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 [ 1130.509046][T17134] RBP: 00007f19dfeb11d0 R08: 0000000000000010 R09: 0000000000000000 [ 1130.517002][T17134] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000002 [ 1130.524976][T17134] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 03:53:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000006800000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:20 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000b00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:20 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000004000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1130.783400][T17155] loop5: detected capacity change from 0 to 224 03:53:20 executing program 2 (fault-call:9 fault-nth:12): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:20 executing program 0: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='huge=within_size']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f0000000100)={0x6, 0x0, 0x0, 0x2007fff, 0x0, 0x1000000}) 03:53:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000006c00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:20 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000ffffe000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:20 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000c00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r1, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) [ 1131.100803][T17170] loop5: detected capacity change from 0 to 224 [ 1131.108898][T17174] tmpfs: Unsupported parameter 'huge' [ 1131.117747][T17174] tmpfs: Unsupported parameter 'huge' 03:53:20 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800005, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}]}, 0x24}}, 0x0) 03:53:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000027000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:20 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000001002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1131.240492][T17198] FAULT_INJECTION: forcing a failure. [ 1131.240492][T17198] name failslab, interval 1, probability 0, space 0, times 0 [ 1131.253126][T17198] CPU: 1 PID: 17198 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1131.261878][T17198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1131.271916][T17198] Call Trace: [ 1131.275180][T17198] dump_stack_lvl+0xb7/0x103 [ 1131.279761][T17198] dump_stack+0x11/0x1a [ 1131.283902][T17198] should_fail+0x23c/0x250 [ 1131.288328][T17198] ? bpf_prepare_filter+0x7da/0xaf0 [ 1131.293512][T17198] __should_failslab+0x81/0x90 [ 1131.298264][T17198] should_failslab+0x5/0x20 [ 1131.302766][T17198] __kmalloc_track_caller+0x64/0x340 [ 1131.308041][T17198] kmemdup+0x21/0x50 [ 1131.311922][T17198] bpf_prepare_filter+0x7da/0xaf0 [ 1131.317031][T17198] __get_filter+0x1d4/0x210 [ 1131.321520][T17198] sk_attach_filter+0x21/0x260 [ 1131.326278][T17198] ? sock_setsockopt+0x12cd/0x1d50 [ 1131.331373][T17198] sock_setsockopt+0x12de/0x1d50 [ 1131.336358][T17198] __sys_setsockopt+0x14f/0x200 [ 1131.341198][T17198] __x64_sys_setsockopt+0x62/0x70 [ 1131.346317][T17198] do_syscall_64+0x3d/0x90 [ 1131.350721][T17198] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1131.356603][T17198] RIP: 0033:0x4665e9 [ 1131.360482][T17198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1131.380075][T17198] RSP: 002b:00007f19dfeb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1131.388586][T17198] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665e9 [ 1131.396543][T17198] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 [ 1131.404495][T17198] RBP: 00007f19dfeb11d0 R08: 0000000000000010 R09: 0000000000000000 [ 1131.412449][T17198] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000002 [ 1131.420405][T17198] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 03:53:20 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000d00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r1, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 03:53:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000002002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1131.635655][T17211] loop5: detected capacity change from 0 to 224 03:53:21 executing program 2 (fault-call:9 fault-nth:13): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:21 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000007400000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:21 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) ptrace$peeksig(0x4209, r1, &(0x7f00000000c0)={0x0, 0x1, 0x2}, &(0x7f0000001480)=[{}, {}]) 03:53:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r1, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 03:53:21 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000e00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000402002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r1, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 03:53:21 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000007a00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000003002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1132.009961][T17252] loop5: detected capacity change from 0 to 224 [ 1132.120972][T17277] FAULT_INJECTION: forcing a failure. [ 1132.120972][T17277] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.133637][T17277] CPU: 1 PID: 17277 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1132.142391][T17277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1132.152427][T17277] Call Trace: [ 1132.155692][T17277] dump_stack_lvl+0xb7/0x103 [ 1132.160279][T17277] dump_stack+0x11/0x1a [ 1132.164455][T17277] should_fail+0x23c/0x250 [ 1132.168894][T17277] __should_failslab+0x81/0x90 [ 1132.173648][T17277] ? sk_attach_filter+0x58/0x260 [ 1132.178666][T17277] should_failslab+0x5/0x20 [ 1132.183156][T17277] kmem_cache_alloc_trace+0x49/0x310 [ 1132.188430][T17277] sk_attach_filter+0x58/0x260 [ 1132.193180][T17277] ? sock_setsockopt+0x12cd/0x1d50 [ 1132.198277][T17277] sock_setsockopt+0x12de/0x1d50 [ 1132.203199][T17277] __sys_setsockopt+0x14f/0x200 [ 1132.208040][T17277] __x64_sys_setsockopt+0x62/0x70 [ 1132.213136][T17277] do_syscall_64+0x3d/0x90 [ 1132.217538][T17277] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1132.223492][T17277] RIP: 0033:0x4665e9 [ 1132.227435][T17277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1132.247026][T17277] RSP: 002b:00007f19dfeb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1132.255438][T17277] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665e9 [ 1132.263391][T17277] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 03:53:21 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) keyctl$get_keyring_id(0x2, 0x0, 0x0) [ 1132.271381][T17277] RBP: 00007f19dfeb11d0 R08: 0000000000000010 R09: 0000000000000000 [ 1132.279339][T17277] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000002 [ 1132.287297][T17277] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 03:53:21 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 03:53:21 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000f00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1132.544125][T17293] loop5: detected capacity change from 0 to 224 03:53:22 executing program 2 (fault-call:9 fault-nth:14): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000d5dc088300000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:22 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000004002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)={[{@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@fat=@check_normal}, {@iocharset={'iocharset', 0x3d, 'iso8859-14'}}, {@shortname_win95}]}) 03:53:22 executing program 0: openat$sysfs(0xffffff9c, 0x0, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) unshare(0x4030000) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000300)={@local, 0x6a}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000440)={@local, @mcast1, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000001880)=ANY=[@ANYRES64=r4, @ANYBLOB="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"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000002c0)={r2}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000040)={r2}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r5, 0x40189429, &(0x7f0000000040)={0x1, 0x7, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001680)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f000004eac0)={0x100000000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x40, "5080dc634f267f"}) 03:53:22 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000001000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:22 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000001100000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:22 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000304002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1132.873208][T17308] loop5: detected capacity change from 0 to 224 03:53:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000008400000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x74e, 0x9, 0x0, 0x8, 0x0, "8919f1c4ecb4f19739704366f0185a369320c1"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0xd, 0x0, 0x0, 0x0, 0x0, "00e95d00000000000079000000008000"}) 03:53:22 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000005002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1132.974887][T17329] loop5: detected capacity change from 0 to 224 [ 1133.056351][T17350] FAULT_INJECTION: forcing a failure. [ 1133.056351][T17350] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.068986][T17350] CPU: 0 PID: 17350 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1133.077772][T17350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1133.087837][T17350] Call Trace: [ 1133.091133][T17350] dump_stack_lvl+0xb7/0x103 [ 1133.095709][T17350] dump_stack+0x11/0x1a [ 1133.099888][T17350] should_fail+0x23c/0x250 [ 1133.104368][T17350] __should_failslab+0x81/0x90 [ 1133.109139][T17350] ? sk_attach_filter+0x58/0x260 [ 1133.114076][T17350] should_failslab+0x5/0x20 [ 1133.118577][T17350] kmem_cache_alloc_trace+0x49/0x310 [ 1133.123854][T17350] sk_attach_filter+0x58/0x260 [ 1133.128605][T17350] ? sock_setsockopt+0x12cd/0x1d50 [ 1133.133704][T17350] sock_setsockopt+0x12de/0x1d50 [ 1133.138741][T17350] __sys_setsockopt+0x14f/0x200 [ 1133.143605][T17350] __x64_sys_setsockopt+0x62/0x70 [ 1133.148615][T17350] do_syscall_64+0x3d/0x90 [ 1133.153066][T17350] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1133.158976][T17350] RIP: 0033:0x4665e9 [ 1133.162865][T17350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1133.182455][T17350] RSP: 002b:00007f19dfeb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1133.190851][T17350] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665e9 [ 1133.198804][T17350] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 03:53:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000ffffff8500000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1133.206801][T17350] RBP: 00007f19dfeb11d0 R08: 0000000000000010 R09: 0000000000000000 [ 1133.214797][T17350] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000002 [ 1133.222779][T17350] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 [ 1133.451700][ C0] print_req_error: 170 callbacks suppressed [ 1133.451709][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1133.468477][ C0] buffer_io_error: 170 callbacks suppressed [ 1133.468485][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1133.482374][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1133.493251][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1133.501289][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1133.512170][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1133.520157][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1133.531059][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1133.539197][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1133.550047][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1133.557921][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1133.568780][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1133.576651][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1133.587527][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1133.595392][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1133.606233][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1133.614072][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1133.624915][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1133.632960][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1133.643825][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:23 executing program 2 (fault-call:9 fault-nth:15): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:23 executing program 0: unshare(0x20000400) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/power/pm_trace', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x0) unshare(0x4030000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000300)={@local, 0x6a}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000440)={@local, @mcast1, @mcast2}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000040)) getpeername(r0, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000040)={0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001680)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) 03:53:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x74e, 0x9, 0x0, 0x8, 0x0, "8919f1c4ecb4f19739704366f0185a369320c1"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0xd, 0x0, 0x0, 0x0, 0x0, "00e95d00000000000079000000008000"}) 03:53:23 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000001200000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:23 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000008800000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:23 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000006002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:23 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000406002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1133.843820][T17375] loop5: detected capacity change from 0 to 224 [ 1133.929748][T17401] FAULT_INJECTION: forcing a failure. [ 1133.929748][T17401] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1133.942797][T17401] CPU: 1 PID: 17401 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 1133.951554][T17401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1133.961593][T17401] Call Trace: [ 1133.964855][T17401] dump_stack_lvl+0xb7/0x103 [ 1133.969455][T17401] dump_stack+0x11/0x1a [ 1133.973596][T17401] should_fail+0x23c/0x250 [ 1133.978059][T17401] should_fail_usercopy+0x16/0x20 [ 1133.983072][T17401] _copy_to_user+0x1c/0x90 [ 1133.987473][T17401] simple_read_from_buffer+0xab/0x120 [ 1133.992853][T17401] proc_fail_nth_read+0xf6/0x140 [ 1133.997936][T17401] ? rw_verify_area+0x136/0x250 [ 1134.002775][T17401] ? proc_fault_inject_write+0x200/0x200 [ 1134.008397][T17401] vfs_read+0x154/0x5d0 [ 1134.012567][T17401] ? _raw_spin_unlock_bh+0x33/0x40 [ 1134.017740][T17401] ? __fget_light+0x21b/0x260 [ 1134.022472][T17401] ? __cond_resched+0x11/0x40 [ 1134.027152][T17401] ksys_read+0xce/0x180 [ 1134.031290][T17401] __x64_sys_read+0x3e/0x50 [ 1134.035777][T17401] do_syscall_64+0x3d/0x90 [ 1134.040358][T17401] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1134.046251][T17401] RIP: 0033:0x41936c [ 1134.050131][T17401] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1134.069725][T17401] RSP: 002b:00007f19dfeb1170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1134.078127][T17401] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041936c [ 1134.086110][T17401] RDX: 000000000000000f RSI: 00007f19dfeb11e0 RDI: 0000000000000007 [ 1134.094138][T17401] RBP: 00007f19dfeb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1134.102094][T17401] R10: 0000000020ab9ff0 R11: 0000000000000246 R12: 0000000000000002 [ 1134.110048][T17401] R13: 00007ffe0e95125f R14: 00007f19dfeb1300 R15: 0000000000022000 03:53:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x74e, 0x9, 0x0, 0x8, 0x0, "8919f1c4ecb4f19739704366f0185a369320c1"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0xd, 0x0, 0x0, 0x0, 0x0, "00e95d00000000000079000000008000"}) 03:53:23 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000ffffff8c00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:23 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000007002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:23 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:23 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000001800000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x74e, 0x9, 0x0, 0x8, 0x0, "8919f1c4ecb4f19739704366f0185a369320c1"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0xd, 0x0, 0x0, 0x0, 0x0, "00e95d00000000000079000000008000"}) 03:53:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x74e, 0x9, 0x0, 0x8, 0x0, "8919f1c4ecb4f19739704366f0185a369320c1"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0xd, 0x0, 0x0, 0x0, 0x0, "00e95d00000000000079000000008000"}) 03:53:23 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000008002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:23 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000018f00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x74e, 0x9, 0x0, 0x8, 0x0, "8919f1c4ecb4f19739704366f0185a369320c1"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0xd, 0x0, 0x0, 0x0, 0x0, "00e95d00000000000079000000008000"}) [ 1134.375748][T17430] loop5: detected capacity change from 0 to 224 03:53:23 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000009002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:23 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f0000001a00)='./file0\x00', 0x20a002, 0x0) mmap(&(0x7f00007c2000/0x2000)=nil, 0x2000, 0x300000e, 0x100010, r0, 0xfffff000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/1, 0x1}, {&(0x7f0000000080)=""/111, 0x6f}], 0x2, 0x6, 0x5) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000000)={'syz', 0x3, 0x8}, &(0x7f0000000200)='\x7f\x00\x9d\x98\x06\x00\xdc\xb5k\xe3F\xae\x00\x00\xed\x00\xf8}|C\x00\x00\x00', 0x0) 03:53:23 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000001900000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x74e, 0x9, 0x0, 0x8, 0x0, "8919f1c4ecb4f19739704366f0185a369320c1"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0xd, 0x0, 0x0, 0x0, 0x0, "00e95d00000000000079000000008000"}) 03:53:24 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000ffffff9700000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1134.691493][T17462] loop5: detected capacity change from 0 to 224 03:53:24 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x2, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) 03:53:24 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5450, 0x0) 03:53:24 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000000a002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:24 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000019a00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:24 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000102000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000002840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)=""/95, 0x5f}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x17d, 0x0, 0x0) [ 1135.201833][T17483] loop5: detected capacity change from 0 to 224 03:53:24 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000000b002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:24 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000019b00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) 03:53:24 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000002200000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:24 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)=""/95, 0x5f}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/igmp\x00') syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x17d, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1135.559011][T17520] loop5: detected capacity change from 0 to 224 03:53:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x3, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) 03:53:25 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000edc000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:25 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000000c002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:25 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000002500000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:25 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8912, &(0x7f0000000040)={'veth1_to_team\x00', 0x0}) 03:53:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) 03:53:25 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r1, 0x100000003, 0x0, 0x28120001) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000300)={@local}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000051b00)={0x7fffffff, [], 0x1, "7d97e393fc4770"}) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 03:53:25 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000000d002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1136.295062][T17552] loop5: detected capacity change from 0 to 224 03:53:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'syztnl2\x00', 0x0}) 03:53:26 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000003f00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000008308dcd500000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1136.648280][T17589] loop5: detected capacity change from 0 to 224 03:53:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x4, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:26 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r1, 0x100000003, 0x0, 0x28120001) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000300)={@local}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000051b00)={0x7fffffff, [], 0x1, "7d97e393fc4770"}) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 03:53:26 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000000e002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:26 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r1, 0x100000003, 0x0, 0x28120001) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000300)={@local}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000051b00)={0x7fffffff, [], 0x1, "7d97e393fc4770"}) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 03:53:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000ffffffda00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:26 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000004000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1137.320672][T17609] loop5: detected capacity change from 0 to 224 03:53:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fffffff600000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:26 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r1, 0x100000003, 0x0, 0x28120001) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000300)={@local}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000051b00)={0x7fffffff, [], 0x1, "7d97e393fc4770"}) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 03:53:26 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r1, 0x100000003, 0x0, 0x28120001) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000300)={@local}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000051b00)={0x7fffffff, [], 0x1, "7d97e393fc4770"}) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 03:53:26 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000000f002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:27 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r1, 0x100000003, 0x0, 0x28120001) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000300)={@local}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000051b00)={0x7fffffff, [], 0x1, "7d97e393fc4770"}) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 03:53:27 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000004800000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1137.718307][T17656] loop5: detected capacity change from 0 to 224 03:53:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x7, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:27 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fffffdf900000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000010002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:27 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfd14) fallocate(r1, 0x100000003, 0x0, 0x28120001) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000300)={@local}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000051b00)={0x7fffffff, [], 0x1, "7d97e393fc4770"}) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 03:53:27 executing program 0: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x80000000}, 0x0, &(0x7f00000002c0)={0x0, r0+60000000}, 0x0) 03:53:27 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000004c00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000410002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000600)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5020124}) [ 1138.444485][T17682] loop5: detected capacity change from 0 to 224 [ 1138.461145][ C1] print_req_error: 144 callbacks suppressed [ 1138.461159][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1138.477975][ C1] buffer_io_error: 144 callbacks suppressed [ 1138.477985][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:27 executing program 1: keyctl$dh_compute(0x17, &(0x7f00000000c0), 0x0, 0x0, 0x0) 03:53:27 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000007fc00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000011002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1138.494242][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1138.505122][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1138.518454][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1138.529334][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1138.586939][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1138.597833][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1138.660623][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1138.671537][ C0] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:28 executing program 1: syz_io_uring_setup(0x2f2a, &(0x7f0000000000)={0x0, 0x0, 0x2}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 1138.795945][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1138.806866][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1138.875338][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1138.886200][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1138.894121][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1138.905011][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1138.912875][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1138.923744][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1138.931711][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1138.942561][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:28 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000012002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:28 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000026100000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fffffdfd00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:28 executing program 0: syz_io_uring_setup(0x39, &(0x7f0000000000), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 03:53:28 executing program 1: syz_io_uring_setup(0x2f2a, &(0x7f0000000000)={0x0, 0x0, 0x2}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 03:53:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x14, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1005}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ptrace$poke(0xffffffffffffffff, 0x0, 0x0, 0x3) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_int(r1, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r0, 0x12) [ 1139.572900][T17734] loop5: detected capacity change from 0 to 224 [ 1139.660956][T17751] new mount options do not match the existing superblock, will be ignored [ 1139.680996][T17751] new mount options do not match the existing superblock, will be ignored 03:53:29 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000026400000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fffffffd00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:29 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000014002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000004d80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)=[{0x80, 0x0, 0x0, "770f3553b3248cc0bba921ead0ecc6aaef9503d38ed33a26ae48c8edfdde122bf327a772b7a87ab4026b3e2f33b1881a33d7b396b40cf3e1086c275d7ae0a895c51ed7145f5b3c4eded94ab0e946909a557feb86f67a1c6d102e03effbc74df1a84014d64a022f814df7"}, {0x10}], 0x90}, 0x0) 03:53:29 executing program 1: add_key$user(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000001240), &(0x7f0000001280)={'syz', 0x2}, &(0x7f00000012c0)='u', 0x1, 0xfffffffffffffffe) 03:53:29 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000018002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1139.876536][T17758] loop5: detected capacity change from 0 to 224 03:53:29 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000026500000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fffffffe00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1140.019616][T17793] loop5: detected capacity change from 0 to 224 03:53:30 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x29, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:30 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000019002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 03:53:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000fff00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1005}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ptrace$poke(0xffffffffffffffff, 0x0, 0x0, 0x3) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_int(r1, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r0, 0x12) 03:53:30 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000006800000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000004980)=[{{&(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000004e80)=[@ip_retopts={{0x10}}], 0x10}}], 0x1, 0x0) [ 1140.652206][T17819] loop5: detected capacity change from 0 to 224 03:53:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fffff7ff00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:30 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000020002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:30 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000016a00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1005}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ptrace$poke(0xffffffffffffffff, 0x0, 0x0, 0x3) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_int(r1, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r0, 0x12) 03:53:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)=@known='system.posix_acl_access\x00', 0x0, 0x0) [ 1140.988410][T17853] loop5: detected capacity change from 0 to 224 [ 1141.028223][T17845] new mount options do not match the existing superblock, will be ignored 03:53:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0xa7, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fffffbff00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:31 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000001020002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:31 executing program 1: r0 = io_uring_setup(0x53c6, &(0x7f0000000300)={0x0, 0x97c3}) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x10, r0, 0x0) 03:53:31 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000006c00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000600)=ANY=[], 0x1000001bd) [ 1141.668102][T17870] loop5: detected capacity change from 0 to 224 03:53:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fff7ffff00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:31 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000007400000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:31 executing program 1: r0 = io_uring_setup(0x53c6, &(0x7f0000000300)={0x0, 0x97c3}) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 03:53:31 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000022002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fffbffff00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000600)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}, @private2, 0x0, 0x5, 0x5, 0x0, 0x0, 0x5020124}) [ 1142.038362][T17911] loop5: detected capacity change from 0 to 224 03:53:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x3bc, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:32 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000025002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000f9fdffff00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:32 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000007a00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:32 executing program 1: pselect6(0x40, &(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740), 0x0, 0x0) 03:53:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) 03:53:32 executing program 0: syz_genetlink_get_family_id$SEG6(&(0x7f0000009cc0), 0xffffffffffffffff) [ 1142.773664][T17937] loop5: detected capacity change from 0 to 224 03:53:32 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000002e002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fdfdffff00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x28}}, 0x0) 03:53:32 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000ffffffffffffff7f00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000007fffffff00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1143.179577][T17981] loop5: detected capacity change from 0 to 224 03:53:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x3c6, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:33 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000032002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:33 executing program 0: r0 = socket(0x2, 0x1, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs, 0x6e) 03:53:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000085ffffff00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:33 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000ffffff8500000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:33 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x54a1, 0x0) 03:53:33 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000003f002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1143.827113][ C1] print_req_error: 176 callbacks suppressed [ 1143.827125][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1143.843913][ C1] buffer_io_error: 176 callbacks suppressed [ 1143.843924][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000008cffffff00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1143.874710][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1143.885598][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1143.894995][T18012] loop5: detected capacity change from 0 to 224 03:53:33 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000040002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1144.005274][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1144.016185][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)=@ethtool_coalesce={0x19}}) 03:53:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000097ffffff00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:33 executing program 1: syz_io_uring_setup(0x40a9, &(0x7f0000000000)={0x0, 0x4364}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3aa4, &(0x7f0000000100), &(0x7f0000fed000/0x13000)=nil, &(0x7f0000fed000/0x1000)=nil, &(0x7f00000001c0), &(0x7f00000002c0)) [ 1144.078953][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1144.089867][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1144.193013][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1144.203903][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1144.213864][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1144.224745][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1144.233316][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1144.244195][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1144.252122][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1144.262985][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1144.271158][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1144.282086][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1144.290080][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1144.300937][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x564, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000680)={0x3, &(0x7f0000000640)=[{}, {0x14}, {0x6}]}) 03:53:34 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000daffffff00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:34 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000247002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000600)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @private1}, 0x1c, 0x0}}], 0x1, 0x20000004) 03:53:34 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000ffffff8c00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1144.796686][T18062] loop5: detected capacity change from 0 to 224 03:53:34 executing program 1: r0 = socket(0x2, 0x6, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1144.825309][ T25] audit: type=1326 audit(1628654014.255:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18056 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 03:53:34 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000000c0)={0x3, 0x0, 0x3}) 03:53:34 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000048002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:34 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000029400000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:34 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000f6ffffff00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)=@ethtool_coalesce={0x13}}) [ 1145.186561][T18107] loop5: detected capacity change from 0 to 224 03:53:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x600, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:35 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fdffffff00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:35 executing program 1: syz_io_uring_setup(0x5e2a, &(0x7f0000000080)={0x0, 0x660a}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) syz_io_uring_setup(0x23e7, &(0x7f0000000180), &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 03:53:35 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000004c002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:35 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 03:53:35 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000019a00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:35 executing program 0: r0 = socket(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4045) 03:53:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)=@ethtool_coalesce={0x12}}) 03:53:35 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000080)={0xfffffffffffffe8e}, 0xffffffffffffff75) [ 1145.866895][T18134] loop5: detected capacity change from 0 to 224 03:53:35 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000feffffff00000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:35 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000019b00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:35 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000256002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1146.222463][T18171] loop5: detected capacity change from 0 to 224 03:53:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x3300, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)=@ethtool_coalesce={0x4a}}) 03:53:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000024c0)={0x0, 0x0, 0x0}, 0x103) 03:53:36 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000010000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:36 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000019e00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:36 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000257002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:36 executing program 1: io_uring_setup(0xded, &(0x7f0000000140)={0x0, 0xc089, 0x29}) [ 1146.967723][T18198] loop5: detected capacity change from 0 to 224 03:53:36 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000080000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:36 executing program 0: r0 = socket(0x28, 0x1, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r0) 03:53:36 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000358002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:36 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000ffffffda00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:36 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000c0ed0000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1147.364075][T18241] loop5: detected capacity change from 0 to 224 03:53:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x28400, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:40 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000025e002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:40 executing program 1: r0 = socket(0x2, 0xa, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000540), r0) 03:53:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000100000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:41 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fffffff000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1152.266997][ C1] print_req_error: 90 callbacks suppressed [ 1152.267010][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1152.283708][ C1] buffer_io_error: 90 callbacks suppressed [ 1152.283722][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1152.346241][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1152.357141][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1152.371299][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1152.382225][ C0] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000100)=@file={0x1, './file0/file0\x00'}, 0x6e) [ 1152.435830][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1152.446763][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1152.455344][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1152.466237][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000200000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1152.528494][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1152.539386][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1152.564935][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 03:53:42 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000025f002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1152.575823][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1152.598382][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1152.609256][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1152.619394][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1152.630288][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1152.639984][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1152.650883][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1154.092060][T18290] cgroup: Unknown subsys name 'perf_event' [ 1154.098202][T18290] cgroup: Unknown subsys name 'net_cls' 03:53:44 executing program 0: capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7fffffff}) 03:53:44 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fffffff600000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:44 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000400000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1f042b, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:44 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000060002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:44 executing program 1: socket(0x2, 0xa, 0x20) 03:53:44 executing program 0: socketpair(0x11, 0x0, 0x0, &(0x7f00000002c0)) 03:53:44 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000ffffffffffff0700000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x894c, 0x0) [ 1155.281840][T18808] loop5: detected capacity change from 0 to 224 03:53:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 03:53:44 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000162002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:44 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000800000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 03:53:45 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fffffdf900000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:45 executing program 1: clock_gettime(0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000007540)) socketpair(0x26, 0x0, 0x0, &(0x7f00000076c0)) [ 1155.667391][T18855] loop5: detected capacity change from 0 to 224 03:53:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x2, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:45 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000c00000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:45 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000264002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:45 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 03:53:45 executing program 1: socket$inet6(0xa, 0x0, 0x200) 03:53:45 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fffffdfd00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1156.276230][T18873] loop5: detected capacity change from 0 to 224 03:53:45 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000004000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x8916, &(0x7f0000000640)={0x0, @xdp, @ipx={0x4, 0x0, 0x0, "5f7767a7bd24"}, @vsock={0x28, 0x0, 0x0, @host}}) 03:53:45 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000265002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:45 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000001000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:46 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fffffffe00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:46 executing program 1: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002f80)={0x77359400}) syz_genetlink_get_family_id$nl80211(&(0x7f00000040c0), 0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000004600), 0xffffffffffffffff) [ 1156.674892][T18926] loop5: detected capacity change from 0 to 224 03:53:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x3, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000002000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)=ANY=[], 0x58) 03:53:46 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000068002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={0x0}}, 0x24004801) 03:53:46 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000fffffffffffffffe00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1157.381923][T18950] loop5: detected capacity change from 0 to 224 [ 1157.395616][ C1] print_req_error: 120 callbacks suppressed [ 1157.395627][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1157.412448][ C1] buffer_io_error: 120 callbacks suppressed [ 1157.412461][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1157.463414][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1157.474301][ C0] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000402000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x5421, &(0x7f0000000640)={0x0, @xdp, @ipx={0x4, 0x0, 0x0, "5f7767a7bd24"}, @vsock={0x28, 0x0, 0x0, @host}}) 03:53:46 executing program 0: syz_io_uring_setup(0x40a9, &(0x7f0000000000), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3aa4, &(0x7f0000000100), &(0x7f0000fed000/0x13000)=nil, &(0x7f0000fed000/0x1000)=nil, &(0x7f00000001c0), &(0x7f00000002c0)) 03:53:46 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000268002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1157.590334][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1157.601269][ C0] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:47 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000003000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:47 executing program 0: syz_io_uring_setup(0x40a9, &(0x7f0000000000), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3aa4, &(0x7f0000000100), &(0x7f0000fed000/0x13000)=nil, &(0x7f0000fed000/0x1000)=nil, &(0x7f00000001c0), &(0x7f00000002c0)) [ 1157.671309][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1157.682225][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1157.732251][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1157.743165][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1157.751521][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1157.762398][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1157.771696][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1157.782570][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1157.790469][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1157.801376][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1157.809291][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1157.820170][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1157.828096][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1157.838956][ C0] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x4, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:47 executing program 1: r0 = socket(0x2, 0x5, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs={0x1}, 0x6e) 03:53:47 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000169002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:47 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000004000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFCONF(r0, 0x8903, &(0x7f0000000040)=@buf) 03:53:47 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000fff00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:47 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000269002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:47 executing program 1: fsopen(&(0x7f0000000000)='mqueue\x00', 0x0) [ 1158.417383][T18998] loop5: detected capacity change from 0 to 224 03:53:48 executing program 1: fsopen(&(0x7f0000000000)='mqueue\x00', 0x0) 03:53:48 executing program 0: r0 = timerfd_create(0x9, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x77359400}}, 0x0) 03:53:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000005000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:48 executing program 0: syz_mount_image$iso9660(&(0x7f0000000100), &(0x7f0000000140)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002540)=ANY=[]) 03:53:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x5, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:48 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fffff7ff00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000006c002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:48 executing program 1: r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000000)=0x9) 03:53:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000006000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:48 executing program 0: shmctl$IPC_SET(0x0, 0x2, &(0x7f0000000100)={{0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00}}) 03:53:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000140), 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000000)='%\x00', 0x0, 0x0) [ 1159.462287][T19049] loop5: detected capacity change from 0 to 224 03:53:49 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000406000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:49 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000480), 0xd4d4cfa3edb58514, 0x0) 03:53:49 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000fffffbff00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000026c002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:49 executing program 1: mknodat$null(0xffffffffffffff9c, &(0x7f0000001000)='./file0\x00', 0xc000, 0x103) [ 1159.844621][T19094] loop5: detected capacity change from 0 to 224 03:53:49 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x6, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:49 executing program 0: ioperm(0x0, 0x8, 0x200) 03:53:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000026d002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:49 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000007000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010028bd7000fddbdf2511000000050037"], 0x44}}, 0x0) 03:53:49 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000001fffff00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:49 executing program 0: ioperm(0x0, 0x8, 0x200) 03:53:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0x4, &(0x7f0000000080)={0x0}}, 0x0) [ 1160.546286][T19117] loop5: detected capacity change from 0 to 224 03:53:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000272002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000008000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xffffffffffffff77, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000100000000fcdb0084e781b84b0a030400520f000000000000000000565179a77facec993505a8ba2bcc9f3d6e"], 0x1c}, 0x1, 0x0, 0x0, 0x50}, 0x4840) 03:53:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000009000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000273002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:50 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000007fffffff00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x7, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:50 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') setns(r0, 0x8000000) 03:53:50 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x541b, 0x7fffffffefff) 03:53:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000a000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:51 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x2821c0, 0x0) 03:53:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000b000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1161.588195][T19174] loop5: detected capacity change from 0 to 224 03:53:51 executing program 0: r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x3}) 03:53:51 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000ffffffff00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:51 executing program 1: syz_open_dev$vcsn(&(0x7f0000000080), 0x0, 0x200) 03:53:51 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000074002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000c000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000d000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1161.931426][T19212] loop5: detected capacity change from 0 to 224 03:53:52 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x8, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:52 executing program 1: r0 = gettid() rt_sigqueueinfo(r0, 0x7, &(0x7f0000000240)={0x0, 0x0, 0x2}) 03:53:52 executing program 0: r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x3}) 03:53:52 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000007ffffffffffff00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000007a002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000e000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:52 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x171482, 0x0) [ 1162.657191][T19240] loop5: detected capacity change from 0 to 224 [ 1162.783472][ C1] print_req_error: 170 callbacks suppressed [ 1162.783487][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1162.800271][ C1] buffer_io_error: 170 callbacks suppressed [ 1162.800280][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000ffffff85002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000f000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:52 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000007fffffffffffffff00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:52 executing program 0: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 03:53:52 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x5460, 0x0) [ 1162.974571][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1162.985476][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1162.996453][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1163.007368][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1163.016633][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1163.027520][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1163.035895][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1163.046769][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1163.054699][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1163.065545][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1163.073455][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1163.084313][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1163.092238][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1163.103163][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1163.119633][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1163.130488][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1163.138458][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1163.149329][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000010000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:53 executing program 0: r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xefdd}) 03:53:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000018c002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:53 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x9, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1) 03:53:53 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000feffffffffffffff00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000ffffff8c002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1163.705663][T19289] loop5: detected capacity change from 0 to 224 03:53:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f00000004c0)) 03:53:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000011000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:53 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000ffffffffffffffff00000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 03:53:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmsg$inet6(r0, &(0x7f0000000780)={&(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}, 0x0) 03:53:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000180)=ANY=[@ANYBLOB="500000001500ffff"], 0x50}}, 0x0) 03:53:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000012000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000018d002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0xa, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:54 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000020000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:54 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000200000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:54 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x10, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r0, 0x0, 0x2) r2 = open(&(0x7f0000000000)='./bus\x00', 0x4040, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 03:53:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$dir(0xffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000180)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') recvmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000002c0)=""/162, 0xa2}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x3, 0x0, 0x54}, 0x2000) openat$nvram(0xffffff9c, &(0x7f0000000340), 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) fchmodat(r0, &(0x7f0000001600)='./file0\x00', 0x4) 03:53:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000192002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:54 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000300000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:54 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000001020000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1164.827167][T19360] loop5: detected capacity change from 0 to 224 03:53:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000193002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1165.009371][T19378] loop5: detected capacity change from 0 to 224 03:53:54 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) r1 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r1, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 03:53:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000196002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:54 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000400000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1165.263569][T19403] loop5: detected capacity change from 0 to 224 03:53:55 executing program 1: syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, 0x0) 03:53:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000022000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000296002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0xb, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x1c, 0x0, 0x2, 0x3, 0x0, 0x0, {}, [@CTA_EXPECT_FLAGS={0x7}]}, 0x1c}}, 0x0) 03:53:55 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000500000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1165.874887][T19425] loop5: detected capacity change from 0 to 224 [ 1165.880302][T19430] netlink: 'syz-executor.0': attribute type 8 has an invalid length. 03:53:55 executing program 1: ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000040)={0x6}) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, 0x0) 03:53:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000197002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000025000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:55 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000600000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:55 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={@mcast2, @remote, @local, 0x0, 0x8, 0x5}) 03:53:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) r1 = gettid() sendmmsg$unix(r0, &(0x7f00000043c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38}}], 0x2, 0x0) 03:53:55 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @dev={0xfe, 0x80, '\x00', 0x20}}}) 03:53:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000003f000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000019a002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1166.246974][T19467] loop5: detected capacity change from 0 to 224 03:53:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0xc, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:56 executing program 0: socketpair(0x18, 0x0, 0x3, &(0x7f0000000000)) 03:53:56 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000700000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:56 executing program 1: socketpair(0xa, 0x2, 0x0, &(0x7f0000000700)) 03:53:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000040000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000039a002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1166.914690][T19502] ================================================================== [ 1166.922775][T19502] BUG: KCSAN: data-race in __ext4_unlink / __ext4_update_other_inode_time [ 1166.931257][T19502] [ 1166.933559][T19502] write to 0xffff88812ff7e770 of 8 bytes by task 1814 on cpu 1: [ 1166.941186][T19502] __ext4_unlink+0x310/0x4c0 [ 1166.945757][T19502] ext4_unlink+0x1eb/0x340 [ 1166.950150][T19502] vfs_unlink+0x24a/0x400 [ 1166.954461][T19502] do_unlinkat+0x238/0x4f0 [ 1166.958853][T19502] __x64_sys_unlink+0x2c/0x30 [ 1166.963510][T19502] do_syscall_64+0x3d/0x90 [ 1166.967912][T19502] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1166.973787][T19502] [ 1166.976130][T19502] read to 0xffff88812ff7e770 of 8 bytes by task 19502 on cpu 0: [ 1166.983738][T19502] __ext4_update_other_inode_time+0x18b/0x5c0 [ 1166.989794][T19502] ext4_mark_iloc_dirty+0x12b6/0x1750 [ 1166.995150][T19502] __ext4_mark_inode_dirty+0x4db/0x5b0 [ 1167.000588][T19502] ext4_add_nondir+0xa1/0x1a0 [ 1167.005242][T19502] ext4_symlink+0x4b1/0x700 [ 1167.009721][T19502] vfs_symlink+0x23a/0x300 [ 1167.014115][T19502] do_symlinkat+0xeb/0x280 [ 1167.018509][T19502] __x64_sys_symlink+0x32/0x40 [ 1167.023254][T19502] do_syscall_64+0x3d/0x90 [ 1167.027656][T19502] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1167.033529][T19502] [ 1167.035832][T19502] value changed: 0x0000000011a338aa -> 0x00000000149e994d [ 1167.042913][T19502] [ 1167.045247][T19502] Reported by Kernel Concurrency Sanitizer on: [ 1167.051375][T19502] CPU: 0 PID: 19502 Comm: syz-executor.4 Not tainted 5.14.0-rc5-syzkaller #0 03:53:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) [ 1167.060108][T19502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1167.070138][T19502] ================================================================== 03:53:56 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000080)={'wg2\x00'}) [ 1167.113459][T19509] loop5: detected capacity change from 0 to 224 03:53:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000019b002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000080040000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:56 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000800000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'ip_vti0\x00', 0x0}) [ 1167.475117][T19553] loop5: detected capacity change from 0 to 224 03:53:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0xd, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000700)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="392724b3a3dca405de4d7d60bbdf367baa5e974d8c5f44d3e7f2cbfa0c127f648d744e4afda059b061158463f83ee94deb9fb5e28ff02dd68b57095f08538e9d48f68f77370bef8e8cf5eac4a9a7111334b36c27795621e1139852df8463fe2422d821d145c2332d98c71bf27f4393f264c7bfad990b60342ceef85a43b6ad05bac34b45c402c009ed4e39fbf848f2410ca002a36d82d00b820457", 0x9b}], 0x1}, 0x0) 03:53:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000029c002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000048000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), r1) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x44, r2, 0x19, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:tetex_data_t:s0\x00'}]}, 0x44}}, 0x0) 03:53:57 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000900000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg$unix(r1, &(0x7f0000006540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1168.167770][T19573] loop5: detected capacity change from 0 to 224 03:53:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000004c000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1168.210393][ C0] print_req_error: 170 callbacks suppressed [ 1168.210405][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1168.227203][ C0] buffer_io_error: 170 callbacks suppressed [ 1168.227215][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1168.337925][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1168.348824][ C0] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:57 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000a00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000001a0002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:57 executing program 1: socketpair(0x22, 0x0, 0xffffffff, &(0x7f0000000040)) [ 1168.388497][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1168.399407][ C0] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000060000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1168.491655][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1168.502567][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1168.512385][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1168.523720][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1168.551645][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1168.562530][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1168.570843][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1168.581738][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1168.592412][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1168.595187][T19617] loop5: detected capacity change from 0 to 224 [ 1168.603342][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1168.617906][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1168.628870][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1168.637025][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1168.647900][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:53:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0xe, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, r1, 0x96a9cd6cabe33b75}, 0x14}}, 0x0) 03:53:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX={0x8}]}, 0x1c}}, 0x0) 03:53:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000001a1002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000264000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:58 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000b00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000001a8002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="110000000000000000000000010000009000010000000000140001"], 0xd8}, 0x0) [ 1169.243477][T19640] loop5: detected capacity change from 0 to 224 03:53:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000265000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:58 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000c00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:58 executing program 1: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000000)) 03:53:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000068000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1169.597001][T19683] loop5: detected capacity change from 0 to 224 03:53:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0xf, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:53:59 executing program 0: socket(0x25, 0x5, 0x1) 03:53:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000001a9002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:53:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000006c000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000380)) accept$unix(0xffffffffffffffff, 0x0, 0x0) gettid() pipe(0x0) gettid() recvmmsg$unix(r0, &(0x7f0000020d80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000020bc0)}}, {{0x0, 0x0, &(0x7f0000020d00)}}], 0x4, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg$unix(r0, 0x0, 0x0, 0x0, 0x0) 03:53:59 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000d00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:53:59 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 03:53:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000270000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1170.312645][T19704] loop5: detected capacity change from 0 to 224 03:53:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f00000001000000000000000000edc0002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:54:00 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000074000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:00 executing program 0: clone(0x3a3dd4008480af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000001600)='\x97&\x89\\\xd0\xe7\xca\b@\x19T\\\x8bf)k\x9bw\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86\x06\x00\xf1/V\x8c\xecR\xb2\x1b\x99vS\xa6K&u\x9dX\xcc\r\x12\x01\b\x00\x80\x00\x00\x00\x00E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xebG\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8b\xd6r\xa5|\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c\xdc\xa8\xd30HX\xe9\t\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89ms\x1d\x1c@\x8eu\x85\xce\xaf\xa6\x96\xa2\x13\x1f-\b\xcf1J\xd9\x93Q\x94R/\xdf\x1e\x9e\xe57\xda{\xe1D+\x1f\xdd\x9aY\xcd\xbf\xbc\xc8\x85\x1c\xdb1\xee\x14\f{\xf35\xcbH\xe6\x0f\xe0]\xef\x8b\xcdk\xfe\xf6\xcc+rp\xd5\b~\xf6\xa2\x87\xed<\xc2b|\xf8\xdfH)\xaf0O\x88\x03n% \x00\x00\x00\x00\x99\xdd\x80\x03\xec@\x9f\x8elx\b\xf1\xb4^X\x99\xbb\xa0\xf5Bx\xa9cT\f\x99\xbf\xb5\xebj.t\xa2E#\x9c\x14_\x19\xe1\xe0H\x16\xedi:\x00\x00\x00\x00\x00\x00\x00\x00\xca\x97\xba\xf2\x1b\xeb\xa5h\xeb\xb0\xc0xe\xa3\x12\xcb\xef\xda\xa2nBP\xaf(\xb0\xf1\x84\x05\x8cK\x8b\x93\xe9oBx\xd6\xad\xfdF\xee8\xca\x95|\xe2\x84\x11\x1c\x81M\a\x04\xd6\xd1\xed4\xc8\x82\xf2C\xf61\x13X8\x99M\xf1B\xac\xd7\xc7\x1d\x8f\xb2\x80\xf4\x1a\x1a\xe5\x8e\x80x^k\xfc\n\xd9?g\xa2\x7f!\xdf,\x7f\xa2\xa43\xd3h\xfd\xe7\x1b\x148\x191M\xf4O\xd1%\xa55\x9f[CBF\x00T\xc3\xe4M\xcc-\x02\xf0\xdf\xe1\xfd\xa8\tKw7hK2(cy\x18K\xef\xfe\xeb\xdf\xc9cX\xf4\xf9\x91._\x9b%\x1a[\xa9ql\x19\xf1,E\xb7\x7f\x993\xf0i:1\x15\x9bYF\x1e\x90\'\xe5\xd2\x19\f&{t%\xb0z \n4\xba5\xa4:\xe8\xdb\xdd\xef\xc4j\xf4@\x8bc\xec(\xb7\xdb\x85\xa3v&;\xaf\xd9\xed$\x9f\x1b0\xad|\xb7&\xbb\xcd\xae\x85\x1c\x865\xb7\xd4_r\xf157\ri\x9b\xe3\xcc\xa9\xab\xf0\x9e\xaa\r\xa1MV\xbe\x82\xbb\xec\"_\xd1]~\xcd\xd7\xc0;\xc7IM&\xb0\x80a\xcf\x13\x1eF\xda\xc5\xb0\xe7]\f\\\x85\xc9Qs:4\xf7\xdcGQY?)\x9a\xee\xe02\xabo\x80\x00\x00\x00@\x00\x00\x00\x00\x00\x00\xbaK\x10t{\xd6\x1a\x03\xfeC;\xed1W\xe6_d\xffy{\xd6\xa0\xc4\ngN\xe7\x9f\"\x86\xe5E.\x8eM\xb4ylk\xa7\xe66=\xde\x96j\x1b\xb9\xc9M\x05\xd6\x7f\xd9\xc9\x7f{&T\xee\x8f\xbcN\x01\xc0\x9d\x8fyd}\x8f\x13^7\xc5\x87M\xd5H\rZ\xa3d\xf7\xa0\xbb\x97\xa6\xea&\xad\xd4\x12\xd9\xe6\x9f\xcfw\x91\xba\xb6b+\x7f\xeb^\xf2\\\xc3\xf8\xea`\x88\xdf\xe1\xb4\x9d\'dW@\b\x9c4^\xd7\xee\x9d\x965\x1a\xdc\"\xe4\xda\x9e17\xb9\x06Q\t\xd2k7\xc0\xe0Hp\xac%\xc7\xb0\xc7\x96\x1c\xfb\xba\xfct/\xd1X\xce\xcc\xc5X\x87\xc6\xe0\x85B{BtT\xf70S\ti\xc5\x14\xd4+\xb6\xdd\x82\xf2\xba\x1f\x14~\xa6#\xcb\x8a\x87\xda\x01\xed\xcfMRJ^\x90\xdf4{\x96}~=\'\x1d\x12[X\x8bq\xf8\xb7\xc0\x9ft\f\x1a \x89\xfd\x8eE\x1eX\xf82r\xd0\xd6\x93\xfe\x9f\x16\x89\xa3R\xbb\xfa9%E{\t\x1fn\x02D3\xb6\xfd\xa9\xf3V\x92;\xb2\x13\x86\x88\xc8P\x8e4\xe7ty\xe0\xee\x84\xd1\xd0\x9es\xee\xef\xf6\t\xc24\x19\xd0\xc2\x85\xbf 1\xbe\xccb\xe0\x02s\x9d,\xf9d\x1c7\x89\x1f\x93\xa5\nnu\xf1\xddl\xb2\x00\x00\x00\x00\x00\x00\x00\x00', 0x1) fcntl$setlease(r0, 0x400, 0x1) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) fcntl$setlease(r0, 0x400, 0x0) 03:54:00 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000e00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1170.687598][T19756] loop5: detected capacity change from 0 to 224 03:54:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x10, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:54:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000ffffffda002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:54:00 executing program 0: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) r2 = socket(0x2, 0x3, 0xff) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa1}}, 0x10) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 03:54:00 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000007a000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:00 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000f00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000500), r1) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}}, 0x0) 03:54:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000ffffffe2002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:54:00 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000ffffffffffffff7f000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1171.383923][T19781] loop5: detected capacity change from 0 to 224 03:54:00 executing program 1: syz_open_dev$vcsa(&(0x7f0000000200), 0x0, 0x414000) 03:54:01 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000001000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:01 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000d5dc0883000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:01 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000003ec002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1171.755636][T19827] loop5: detected capacity change from 0 to 224 03:54:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x12, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:54:01 executing program 0: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) r2 = socket(0x2, 0x3, 0xff) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa1}}, 0x10) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 03:54:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) 03:54:01 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000084000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:01 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000018ed002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:54:01 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000001100000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:01 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000003740)=[{&(0x7f0000002240)="f9", 0x1}, {&(0x7f0000002340)="c75dcb44bd3352a38fc09a915bd20600165479fd1cd2127bcb634a8a4d6d73d9d996b7833fb1b70274161bfa817478ff1e4550b7983be962a1eb81e1a8dc4714f44bf2a6588e55e6cca6f767d90c81ad32408aa3feb8020dc5f77e4536abda3854e9f4890d072351e5e6f4d84f3aec6cda5fc20cc9f9ced4f0b4ce7e97ba0a17148d5121bf386dc650468a7493649cf820a177c064837b6c7c4a74d396ba9d18b18c0e60da0a3f0bfc70ee11099f8cab1b14946da613a77f701aa1585ec457745ca45fc1cad9f1806821affdbe57ed24e906fc", 0xd3, 0x7}], 0x0, 0x0) 03:54:01 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000018ef002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1172.434880][T19856] loop5: detected capacity change from 0 to 224 03:54:01 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000ffffff85000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:01 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000001200000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:02 executing program 0: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) r2 = socket(0x2, 0x3, 0xff) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa1}}, 0x10) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 03:54:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000088000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1172.785911][T19888] loop5: detected capacity change from 0 to 224 03:54:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x14, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:54:02 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) 03:54:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000fffffff0002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:54:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000ffffff8c000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:02 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000001800000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:02 executing program 0: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) r2 = socket(0x2, 0x3, 0xff) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa1}}, 0x10) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) [ 1173.505934][T19908] loop5: detected capacity change from 0 to 224 [ 1173.533843][ C1] print_req_error: 210 callbacks suppressed [ 1173.533855][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 03:54:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000018f000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1173.550628][ C1] buffer_io_error: 210 callbacks suppressed [ 1173.550644][ C1] Buffer I/O error on dev loop4, logical block 0, async page read [ 1173.604662][ C1] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1173.615806][ C1] Buffer I/O error on dev loop4, logical block 0, async page read 03:54:03 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000018ef002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:54:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000fffffff6002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:54:03 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000001a8002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:54:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x3, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) [ 1173.819191][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1173.830079][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1173.838109][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1173.848985][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1173.856944][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 03:54:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000fffffdf9002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) [ 1173.867834][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1173.880443][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1173.891384][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1173.899337][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1173.910214][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1173.942250][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1173.953138][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1173.961436][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1173.972347][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1173.981464][ C0] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1173.992340][ C0] Buffer I/O error on dev loop4, logical block 0, async page read 03:54:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x15, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:54:03 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000001900000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000ffffff97000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x28400, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:54:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000003fa002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:54:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000019a000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1174.600311][T19966] loop5: detected capacity change from 0 to 224 03:54:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="49a198644604e3fb5b94b6d4e31ab5ecee86c0b95595f95ca611de70b272c50c34b639eb7a276c58e95facd691b5d81d34a2043ed19c7d7b28a502aaf7be2072c1ea181b00f8cc6bea7ef638ebabd997d90ff9bd75c998a7a9", 0x59}, {&(0x7f0000000080)="06cd699dfb1323718357827dd31bd5422dee41f5625e9a2d32be7f481f77472d57dd4ae6892fbab92e18f61192e05d57e1c2452070b94952a830b7cbd590e28972de720686d62e744c93ca1bed3d270e5d6fc4a2cdbc45c0a72faac591368fbb785432aadd42c81f9a66313f501202041acb974ae485f7", 0x77}, {&(0x7f0000000140)="f6aa687d4126923281a4a11941041e364292571dbad118695838c671d39e6d2750788b325595bd6646bd2ed34fd0d871e9eb8d6342bbf77a53187071e02144b95a5cdb2cab808074c8c8c8c1dd3136c572530d88dfc2eb84df03b0eac9ff666b980636495276e43ee853f8dc4b31f8ef7e34f44be3ae4e5acd43078b5bee0d0aa898ae1be5ca3ddac6b958d5bd0285ca93e3a0584c2493c37d53e383172f747d64d2a57f2ab847a550a428cbd4c3019a54febb24c452b5", 0xb7}], 0x3) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x2000800a, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x734, 0x0, 0xffffffffffffff39) 03:54:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000fffffffb002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:54:04 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000002200000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000019b000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:04 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) socketpair(0x8, 0x6, 0x200000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f00005f8000/0x2000)=nil, 0x2000, 0x1800007, 0x12, r2, 0xb7aba000) preadv(r2, &(0x7f0000000280), 0x0, 0xd9f, 0x40000) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8924, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001580)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000080)="2508c21e31ff261d222efe2ebf94282886629119cf3db93039", 0x19}, {&(0x7f0000000140)="d48cb3ce1c81dd9d9d4afc59caeb78b09e5964b81471b8a2b89dc91e1f3bfda58ed34530a5d8e32f965589e9079818d595048dad230f809e4fdb4848daebe748e94efd747a418174584adad8fbc8e1f5e9e4995c223510b416e59fefa1f3f106032d65f0c8e4f2c6b440188e12987e273af47fc8fe9659d0b20a1c6e9156e1d54d315256bb6e1fc384462c0aa55f7e157ca4becebc11d5f3d643f726037cdac605fd71097fcd7bc71682167d08d40c16aeb06b50359c8b721045e5b91c6aa7524a8102d6bd49f2e160c74d0442a89d3737d2329645579313067d31437f1073", 0xdf}, {&(0x7f0000000240)="562ee10cee7d80d998cdb6eb01fb638ef8328b037bc9a5082e9a6ab5f8191bfcbc3686f52733e78b8279d869c7b7700b1c6e4770b3877bdf131bf4301cb701b15b68d2df0802873e95c1e4d731a70d0c156cc2d75a87d0b0978d083ddaab2db2bf5ec58d67b864c1afe6b6023b60d41ca49232e0883fa32c99aab16cb2cd834c2755549c89292488c6c134", 0x8b}, {&(0x7f0000000300)="e130d9e5713cadba8f751d4ac5d80bd235c3d341b383755c809cd31bd4fdeee80b9783c93af95672bb61925d0295deb20ac7886c1d17de19fa629ee5340e24737421e23b465a93351fec3f1902", 0x4d}, {&(0x7f0000000380)="b606fc8fe4f91ade55945d142d9ace7af8caabbb1e629a96092c9c1005dcfc9cf35b97854bc66cecf21280b551da2bf25f032078d01249629a3f6ca24125f089f03cbdc7546019ad8beda141c03f2c5e46af8c17e672f390e6be9b6d96c88122a3d9f995b873ed01fe04300b98c6d0c7afd8b1a4112fef2852014c510b14642fbdb7253a7484f68c87f7cdb9bc066b9a3f55db45c156a736f51df2e803a7e110ec87eac0140f7d258aa0866395291d5126e7043bc60c3f42c7eda6e5fc3100dc2127607ebe546c4410185f25e2ddada0d6c270f7513421c538c8e5ae06bc45d837080bfd0bbc6eafbc963a8d26e38bc7", 0xf0}, {&(0x7f00000000c0)="aaa22ecbf4ff9a5240d9261427a0d912ab2039214875387b52b281f9a1e435cffb263dca", 0x24}, {&(0x7f0000000480)="02ee6b0f701cab4b2166293d251fdd3536427083f27840b12a539621ba432fe93984312ca031efd00da0454bd960e5b1bd74764d3b9f395c8df363e0d329f370a6beab689277df48864a61d853535833c2dd153400b9f5d56f3fec4c87f47e3047af1c0bab0353060792b000ad6f01eacf02", 0x72}, {&(0x7f0000000500)="c8beb6eab13eef4e9b94b692376fb41f8797fc8b613ae98a8ec27797ca52ca5f521b09f63231c796f9059dbc7a94b2e01e028150d71bce0fc6805daf8abc2dd90de93694235618dc3cf4a8a66863bd88da5395213684b8ec8686e8af9bb0421c1af4db9b3dde93fb12dc5641ebf9d8b10e14bef978472b57ef7cc55b869b2674f65779bf83e8cef4b0bd9382402abd532f65b877837f9c9a4a69bc8dd7ec5af77bb32f145b6080b0e1806f9338d84e36fc3fc91e476a743bb4a5cecf6d93569f1553d20c54fad980f94d25cabf46dd3df1a536ec72ed7dbf28bd5085d3587ae28b428b04a4acfc6f5c7ff543c8ba11d0f3158d5abb0659397906ffe6998a48fd0a06747ed7a4fa6248af6d8c10272e9601047b7d3f11579dd98835f752779c126636231472d32d79704d5de42e92d4ec022b159eaea61ec995fd35a95440657a8ff6b32661070af661c8ccaebb9f215d97c50e7109a84ca46434c161626ecf57c8302edbe38d2befe1a379d1b243925209a2df9baf4c5cb986b262b9d714172ad7f618f9c085866d1fdd22ab58b89b03961eb8f87ed8541204c81db9641ed85d2af2d5b0c8b7a062d3134e6a949431332f84bf2d1f18cf306d77bbfcba1c6316cda06374c07536683b4ff70ea894a77e3fef657d2c8d1b21f631c8777c41407f2227753212b0b74aa79ac03ff1e3c8968dd663f22de2d21b4c92b537b44cac8a11a53fe0f1ddc09c6862408418c52b79edda1414c4237e5b48f96ce1035d63cdd05d926fe01fe48091492ef4a3ba0a13f2afbc6d754a2781d2a4103bfa62928de2d79b548bfb2d1348c645e5c660ec68ce95fe46d662b479f84c97cfecc8afe91b4eafbfaff9f6e7391bc6f9d1168e56eec4bb9015cc17bab1593b43237ca2e46d129811cc77e355be236edc4e89f4352c5946f0148f954dee7c8dad678692a9ecccb2db4e97b49106ad6f851d22a6b3b0c0130c3481a327e9bbc3e91ad7b04c280a20fc0bb214e10cc3b8a6f693cd722a8c9adcbbeccd26e400aa7ea9ce089ed6b9afe966fa82ccdf8ab408a239956fe4db9ff8b1af4a02b36428982b4bdb444abceabf53ae92b49cbb26ee0f0283a8cadac3874b651875423731ae176e6441ccbfe6680f9da477a86dc32c28e19b5573064a045c5ede0d3ee1cf024d1d9d95567db3611a71ba8400c7e8d8f50c3286a36f32565be434a71a47acde700e5df66f4214d5ebd0c5fc2965d8a8f71a5eb0ee97cbefd10696cf6f6f1218716d29f48d12d92e64434688070f3e69d6f769a41083b147b7eb417852f4cdc21db304842ce07fa8f71f86f716bb2b494c89e32a6efb3ebb839b3c19c5c80ed1f4ec796fe3df9bf6995f7084ca628d752dac29baee07a6d049676c9a946e7d8fbb0dbda56843855b614259ec0407ab033745d29ebc8eb12dc1ba0c8794fc4319267a97bf61ba8b67b052111e1501cebd2c5d7e0ac909ea09d822de002b57b8e00b731951492e4f83fc82cd54c43946da42bfeca431323d13f62bbf9ba970e4406d6960be7de8395db514a886a8ff20c0e516b32a6bba6fe143ed8d0616b6ff9c25a196442be25023341c809d0a5accc4a39c874bd08357d8f9692b0df59547dc065ae82e0e8106ac0eb68727199d63b6d37b811ba349804f798bc4182d174a38cb68854b7cabd83c43e5ff893f97da9322091cd21a2a27550aac987e43ae8b1711fc73fe781ebbedb57a8375348bc2e0e8824368349f6fb0c2b11a22de06a5b0f2cf9197cc871973472cbc2bbe024acb19b043eafeae349aeaf790486992b51389caeebe6b6f6a00c4764b13340382603bcd2e487f75c6bfe95379fadad8ebe994dda9a615ea06f5bced04eac3e4feae73d9e543dde40a0b6fcaa8b2546fb8efa84b5dc35de11ca30e78f79e255d79867a02d945991ce1ea0cff165bebd0974c0cc05bfee75679c28fd6a129c23da50f9fa84a611eee6a9c894d91c2d43c08e33307dd540bb7ec67769ee1d47ab9c170bda1b05b355886630aedc3c509e89fb1d37010d79957ab9bc1330fc4e015f03f45feef28baaf023320778c19d1eb754aa180ff8b142e001226cfa9c1e41c56823270ac6195430d8cf34b49f3e447a4334d1277d07a0dcdd4f4083921311c6f7ba85b73a21a7dcfd15f88a50f1f8bc4677f1d346fca7d562bb971eea60394db019d6cf45cb9a92bee9c009010db43d5764db53d11271b6c5f1f59d8445c674e1896be9798aebcba4f5c298798584074b9bb307e4e87623f6c4dc9b7acba0072f0357ae91a510f0ede5e1b008c9b69769f0112c23b002484913d1e1e2c5db98dc4a98acb2507d16052e56dd6cd807a1db082b8f9948f6e72661e56a156fc1a164ba320ab0e8749cae39235398a455ffa2fda1e5f2d446eb53b77b3746bc52aa985c7879b7c910838ee884e39267bdfb116e1dc421a0b0bd3374fa11497749db019e629ccd00f6c07fa7c52dd9f572cf85cdd1a9fbbe39cef1b437a73629148fd78afce2d1b19fa5c465fb82167397c553ae42ea7f04df3b912b75f12e4a6f91fe7719bef4f9af1d361d852ef31548eacedfe106a6c7b7596e0681f76c49b9d23bdf9901d71b197cb2f10397cb64a021841e828556320c830017c1954469aa30c8e69fe1a7cfdbbfd2a63de12203e6f13fcba23395589bc10d354a92e34901dc9b26d2f5a42b0c7e46de5b618f80548a322a15331e00f0dc61d3fe9579ab27e28918968fcd6789a79e231c709f6c6b50abf9600e309f0a3ecd85c8ad45ee8bee57431b364f9492559c23a8d0e5f3c5c76b545238583d20bcbc7c52977fc6320ee51be2c3d610975a75c84e164e9d37d81e420c47ed787fcd37e985d265758189db5fe8d75d41369fffa0906407c4b30f9d1e8c0a6c672c5951d7a6f7d017c2abc9a39d357629f5026da8a4478e3d01c44c1687027047e9b04fa308114d44eab11de5dab7200b088028a2cb1125a0c40d170cf7060977f7f6bc0384a5baed3b97ec09c5cca70e1f099908a222873d25f0b8cab9e6ee5fa53e7b79b528415b51a71b068ae80f3ffb5aaacd4e5ba097765931767aa41815d1d2703c7bdfa755f536139e038ece09dc95d2346c682b0db2738e4c107b78339b806c6ace874c3f639a63f39801b3518fe824af35c176fc75e5ee786f4ef641dcdb796e058b96c19ca21204011488c54325db0349bf7f87681d17109b8c0cdcf7bdcc5b225376103eac82404ccd3062052df66b4d2e86bb6534777d35ebbba43c9a476ad7d7205a6f4b6c158843c37cfabb31e6bb396f8e12e409d767bed626d7288767c9edbed8181352beb354136708595814c0d206b014608eff8fc66559ca0a345049f14a3a30ab8803ffd8c7a92dbc5cb7859b1942a28f462ee444c18639a0350ef9d07cf6df1477c279bed09d7ceb5bf0a8b83d9a461076fc1d31bfb68959512cc4aaa56a79a238da7841cf219294c373d4374457877944962369c0ca8cdcada3c9a0d1d54e7b5a2e3dc84b43f37e36aa5be08b2320a35606373d5a5f128d2d6f42290a78c9110cc16e1369f2b013a9c4cf951beb5bcecc27371f2579a1b4f9c9a8c36a9779f125ad9058e3967485e0e8dbc1bfe160ea95f25e8d6c3aa0d2b3cf18830d02a9cc8792b375804df9c8bdf04bcdcaf611da9fce4de070f439a727948e3b0f919cf7ffec9b4dcf7d814cf0c57e087af6a036556ef6a0cc83244042ede736579849efc077c6ed17abe9c9aad4b441c60d49cdba140e5c4ff3f28f93f3bf55b2ebee6c22d3545a6ec688a758d946881d8ecb2b3b0ed4ea06ba5dcc8e5401e5fd285b540651a33d4cb836a20c1c4dea5b696790bf3fe081c9b7184e9848298f147fff63831a62ca67dfd415e55fd650edf7c5f73614151c27f0826ee7ebc29d4becda3ba9e0fe366d55a9bd5a7bcae2c070d20a87776576293bd5205015a476eb01216f6cdfb5f528f20f83f96631c3d11d0af83d4629089c8f16e0f0af6017f1237bc4de3df401deec22c581f9808f7f82f89834f6e1a9c75d296336b38bd28f579823de90d2c6b5c41a04ba7153fdb267bea4088b68a81ab72b5da81328e418b9933286923c3702d1b12abb800c7df1ccccc16d065382815436212482abe49c2548a5e34267d1d94aaf34765f3d1ee3c5cfe8439a823a8135ef100f12b7055025922dd9fe52e8511f13a5d15f3618a60198da439618088706b27b02461d98248c04ffa4af18a83af77375061de342c1b70f4592776f2440a1800924df205357cd1c4dc9bfc2e5b9a4dbde5f80940037820d4127c712bdfcf6befaea1f16604d3a231ad50fc934a7cbd098a4245ce8ce728a7605803976cfa5debd37c30703991f8855266b1e744c8ffd4d9b4c9ffb4b11c6c1db156b5e50e1795034d4129af848a3f559a30a4bac8770d337f64897cdeb16645b05bff830577913de5334be852c68d451a8e45c3e9f4d1c3673e4e8c589942924d52f9861a3b464e9c4131970ab995464108bd3c08b2cf421704066dabdffe8742122d8c602e1c6c8f48a3ca070cdbfd4eed851a81282dfd57d2b31fc006be79cd09f2f7b855f6693c8959da0fff159421a733fb470c06d4fb697d3957e59bf03b30b689c2d871778b573a63eb0233218f6c1cdead958d8d27b673dd212e8474c9ea9d9a007616a326176913882e60392caf45f663398bb17380971c9b4dad24ab58182ebc00a68e0dda36168cdd60d90784aa146a3cbb40d0e13f4fb6f06ce693b873664defee5395de9dbd8154d70b2c95bc8a40aaed3cbffb6d31bda533b7cbf29338771b7d0f8dc7d33a8ff5a8334010ad8ea4feb627a002705cb8014961a8aa180db55703dcba68bd60c414e725728e6fe848479466e7a4392ac6933ce4b45ca5330f9fe53a7ad42dfce62e1de8946f7d89ce0179c381ce23ca46f24d64b4d86e308d3703af30e6133fb8f32e289c90792012ca00ae69036875a7db15e6fa5ad0493eaa1f4effbab3408ee243cf16b84d4a33b61fd66b5c4577bfea866ccab215303d9e957fb9970b7636430c2359f76fae8c3bd32c9688a1ca2c16d3999bad38b6628beab0134c02dfddea47f81636dbc7a6f451086d420752878037874ff9c8b52d6ace0933d516bb207bcc08e3c2140db40ad5e65dd6e215dd5667537c57748bf530598e2e250041d3ee5383b35e3d0ff581a5bf545c54bb6236560037d77da8ec8fd13357113c01553e54b0138fefe10d8930b8a5b91d6e7d3132997b27747e00de4ae1a71154bdb406e8d71559166dab1cd2659f03510cae4d74cd4494f383015f3e5ff7cdb77590d33867f3f99b57255ffa6aed7f736bd9fa857c7a9517945b59199df09b9a722e3c2256eeb896d8fb0dec365306275f208d6986e24444ae795023ae1e0f274d839be7d45a50cd96586b9ced516db6cb7cf5bcda2c4bee270482a40fb5ef62b1c941abf541cfa87fc36960e61a918659c578db8228ccc09e9f176bdc5fa8a5f355baa1c6f46cd8764abbf8f6bfa7b338eaa5ef96f2805d1484cbadfbfec6e96b443e909402c24ed8c581e1cc0ec5429b8e8113ffdccc8df9109b0fb39a8b73e099c30f5d85e1ece7e4a7d0a2149761f3f2c225e86986f63cd0fbddc69742779ec3543c5e2e38b2b429ed1a0add14421163e8beb4c9a8918d88282b602c733ee0015681b4def2239782b886de6167296f77da35e0120b0750af293bb5d3abe03780c01ff80bea7e60dcf0bf014229c561056b21d6b293eca677e048660b81020e8e3d76fdf560ce12aff314a57d42da6d3fd1009badc9815bcd", 0x1000}], 0x8}}], 0x1, 0x40) 03:54:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000ffffffda000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1175.380348][T20004] loop5: detected capacity change from 0 to 224 03:54:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x19, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:54:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000000003fc002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:54:05 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000002500000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000fffffff6000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:05 executing program 1: ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f0000000000)) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000040)={0x5, 0x7, 0x8, 0x40, 0x9}) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x2, {0x2, 0x9, 0x7e0, 0x3f, 0xfff, 0x3}}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x4, 0x7, 0x4, 0x6, 0xffffffffffffffd6, 0x1ff, 0xfff, 0x5, 0x8001, 0x7, 0x7ff, 0x1, 0x30e00000000000, 0x80000001}}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f00000010c0)={{r0, 0x80, 0x2, 0xfbd, 0x8, 0x28, 0x20000000000000, 0x80000001, 0x3f, 0x0, 0x8, 0x8, 0xfff, 0x7, 0xffffffffffff9e65}, 0x40, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = accept(0xffffffffffffffff, &(0x7f0000001180)=@tipc=@id, &(0x7f0000001200)=0x80) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001240)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001440)='/sys/power/wakeup_count', 0x10000, 0x9) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r2, 0xf502, 0x0) socketpair(0x29, 0x3, 0x6, &(0x7f0000001480)={0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8982, &(0x7f00000014c0)={0x8, 'veth1_macvtap\x00', {'team_slave_0\x00'}, 0x6a54}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001500), 0x8080, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000001540)={'sit0\x00'}) preadv(r4, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/33, 0x21}], 0x1, 0x1, 0x3ff) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) preadv(r4, &(0x7f00000019c0)=[{&(0x7f0000001600)=""/129, 0x81}, {&(0x7f00000016c0)=""/3, 0x3}, {&(0x7f0000001700)=""/158, 0x9e}, {&(0x7f00000017c0)=""/215, 0xd7}, {&(0x7f00000018c0)=""/243, 0xf3}], 0x5, 0x7f, 0x7f) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000001a40)={0x8, 0x8, 0xfff, 0x6, 0x7, 0x3}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) vmsplice(r5, &(0x7f0000001bc0)=[{&(0x7f0000001a80)="ce846b5b938ab6062b85ea29f3d4947389b98696fa1a5f5b41815786112d1edd7d41e60257c7ceef628a211dc8b4ffd23c9a670cb2fff88b8081b74520c3e4d8884c6e901f3822220d797371daf9a0d6cd3a63825545c1f4b584cdebec1ecc45ec393aeb4166775f3ec7f13b9e48dcaced96b0ffdc43ba37bd6d054517f941e20cc22ea1e0fd74add9eb3e9fba47b9410a7126c822c85189b320bb605e", 0x9d}, {&(0x7f0000001b40)="d5c614930e0091fc98c9c15d5fd5e83c6d6cf1c872583b56", 0x18}, {&(0x7f0000001b80)="b65a0c31f695b64829d57d181c3d278a2eb82b41637f12d41e89582ab2e6e3", 0x1f}], 0x3, 0x2) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 03:54:05 executing program 0: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101013400200000000000002064000000000000647809140b2a3a08000000010000011200660000006c0065002e0063006f006c0064002c001f0000000000001f0008000000000800780b140b2a3a88020000010000010a00660069006c00650030", 0xa3, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000100)=@nullb, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='iso9660\x00', 0x30040, &(0x7f00000001c0)='*]/(%\x00') 03:54:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000fffffdfd002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:54:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000fffffdf9000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1175.652740][T20035] loop5: detected capacity change from 0 to 224 03:54:05 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000002c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x2000000000000000, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x3, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x89e0, 0x0) sendfile(r2, r1, &(0x7f0000000080)=0x3, 0x40) mmap(&(0x7f0000618000/0x4000)=nil, 0x4000, 0x1800003, 0x10012, r1, 0x1000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = signalfd(r0, &(0x7f0000000040)={[0xbd]}, 0x8) mmap(&(0x7f00003a0000/0x3000)=nil, 0x3000, 0x100000e, 0x80010, r4, 0xa7c59000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r4}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 03:54:05 executing program 1: unshare(0x40000000) r0 = socket$inet6(0x10, 0x2, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setpipe(r2, 0x407, 0x1ce) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) unshare(0x0) setsockopt$inet6_IPV6_ADDRFORM(r5, 0x29, 0x1, &(0x7f0000001140), 0x4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) flock(r3, 0x0) unshare(0x20040400) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8916, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xb8;\xf3U\xf7c\x8e\x14\xb6\x1a]\xe48\xdd\xd4\b\xc0\x06\xb0\x0f\x89\xa7Mlhb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\xbe\x91\xed\x05\x00\x00\x00C\xcb\x85\x9a\x82j\xf1\b\x1d\r38\x00\x00\x00') r6 = socket$nl_audit(0x10, 0x3, 0x9) writev(r6, &(0x7f0000000080)=[{&(0x7f0000000140)="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", 0x1000}], 0x1) sendfile(r2, r6, &(0x7f0000000040)=0x2, 0x1) 03:54:05 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000004800000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000007fc000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1176.039194][T20084] loop5: detected capacity change from 0 to 224 03:54:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1b, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:54:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0000000100000000000000fffffffe002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"]) 03:54:06 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pread64(r0, &(0x7f00000000c0)=""/190, 0xbe, 0xb3a) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.pending_reads\x00', 0x131800, 0x100) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000328bd7000fcdbdf2501000000000000000941000000140018000000017564703a73797a3000000000"], 0x30}, 0x1, 0x0, 0x0, 0x4040000}, 0x5) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl(r2, 0x800000000000937e, &(0x7f00000003c0)="0a00000000000000180100") r3 = socket$inet(0x2, 0x3, 0x3) r4 = socket$inet(0x2, 0x3, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x89e0, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x27, &(0x7f0000000180)={@multicast1, @multicast2, @multicast2}, 0xc) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x89e0, 0x0) pwrite64(r3, &(0x7f0000000040)="823b9bfea4043cabb2d98c9e0c6af232452722d1b7c9dee608220d50a0f4cc6206180a99394da8f73924fb1e9a7dc4d2828e612a59befb87e1d0ca2cc674c993110f7f1fa7a6641489c2c02e2349eee94be3eb13171292f1943f01569375b2f29641acbc42e31b3aca7c330256c0c0f3fe309525", 0x74, 0x401) 03:54:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000fffffdfd000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:06 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000004c00000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000008000000000000022001c", 0x9f, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5807006d413f2d5309854d285cff8a1f4c164da7214f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb962560000000043b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000040)={[{@cruft}]}) 03:54:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0x208e24b) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x12, r1, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000180)=""/213) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600091, 0x15) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, 0x0, 0x4) writev(r2, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000140)="b6", 0x1001}], 0x2) 03:54:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="846fa800000000000065ec"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfffffffffffffdf5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) clone(0xc040, &(0x7f0000000240)="ecad7c6f8f4ffe7887ce9ccf3722f31a221e284001d847c8bc3f3950cf210aa9d86ef5f59b18eda58e14851fd0c0c3afb383f7290e6d7fe37a6b39df2f1408794a760a81fe9e2eacb1dc0c3c153575bc4ea69f874ca447956981d0082e668602687148c267639199d377a700a8a2de6b59911351e84e7d3a3b3529633506027986c3eb53b9abacc43f8119395a5d429510535a4c450482565b1f39e1f7881d", &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000440)="9a2bcef59a996b63aca13881f93da44f8a6e14a150ce5edcdec09a03dc8a81d5d924188394b5a8c327e85a067e5806b405b74ed4fb9c3a9f05e00c61905a3d369aae06d0d0b3b72b3ac43b2105209b69ece9a044a7053f888949fdf70eab8143ca4916338b50436ffb893a2faf0340c2600ab541f624549e8a7a30df82b1ea9603a6c3c6e34ddacdf5216f626ee19e11222b9cd00fa7e11943e0d4dfceb6e06d450e7e9128fa92906aeb0f4b9d8c2d1e50d70f5fad4af4abcf58c6913a9abf126eefa0f4c0613bfabff9c86b1b34c6bd7215ba77e90d") wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x39) 03:54:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000fffffffd000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000003c0)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000040)={[{@cruft}]}) [ 1176.775692][T20117] autofs4:pid:20117:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(10.0), cmd(0x0000937e) [ 1176.789068][T20117] autofs4:pid:20117:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 1176.811625][T20114] loop5: detected capacity change from 0 to 224 03:54:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1400010b, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000fff002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00d39adcc7b70e4e92512003b9066fc2d04d34ae9beb39f65d569bc7a01be1660d74a85e9d094a520b11a51d0cab996b9412835ef23e489b6045c94f"])