000000000d00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 719.069810][ T1039] loop0: p1 p2 p3 p4 [ 719.074046][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 719.080202][ T1039] loop0: p2 start 32 is beyond EOD, truncated [ 719.086320][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 719.086464][T10450] loop5: detected capacity change from 0 to 224 [ 719.092492][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated [ 719.112123][T10453] loop4: detected capacity change from 0 to 224 07:35:02 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, 0x0) ptrace(0x4206, r1) ptrace(0x4208, r1) wait4(0x0, 0x0, 0x1, 0x0) [ 719.136293][T10457] loop0: detected capacity change from 0 to 1 07:35:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:02 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, 0x0) ptrace(0x4206, r1) ptrace(0x4208, r1) wait4(0x0, 0x0, 0x1, 0x0) [ 719.179405][T10457] loop0: p1 p2 p3 p4 [ 719.189803][T10457] loop0: p1 start 10 is beyond EOD, truncated [ 719.195933][T10457] loop0: p2 start 34 is beyond EOD, truncated [ 719.202085][T10457] loop0: p3 start 225 is beyond EOD, truncated [ 719.208228][T10457] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:02 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0xffffffffffffffff, r1) ptrace(0x4208, r1) wait4(0x0, 0x0, 0x1, 0x0) 07:35:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000e00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x119001, 0x31) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) vmsplice(r0, &(0x7f0000001f00)=[{0xffffffffffffffff}, {&(0x7f0000001e00)="345a4d99e45ab847f40c41710a3a659c006e9eff787d0549dc597850f349bff259d3c670969b8c725295dd0e79b8df92d5a3f43cdc3e2647bb2b6f07ecc775ba5ca53bb1f976134e7b8ed733386e51d123053211f8c6e7bcee985ddee3b9b1a24679297e3e48f0ce8cd6bece19f5610f08a1e6a4019e76ccb8d69f4462656d5808b59e3ffc2feb2345714b56a4763766b58aa0de1b29c455378619a1c59404890d46c7f4599c62477c9e2a2b725cf14b2fa3548b56ad9114329482fc77f0f4a1d24f5c8660f20857fd398cbeea6acf76", 0xd0}], 0x2, 0xe) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x7f, 0xf8, 0x4, 0x5, 0x0, 0x10001, 0x802, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x980, 0x4, @perf_bp={&(0x7f0000001d40)}, 0x108, 0x7fffffff, 0x1, 0x5, 0x4, 0x9, 0x6, 0x0, 0x2}, 0x0, 0xc, r3, 0x3) recvmsg$unix(r0, &(0x7f0000001680)={&(0x7f0000000380), 0x6e, &(0x7f0000000140)=[{&(0x7f0000000400)=""/174, 0xae}, {&(0x7f00000004c0)=""/182, 0xb6}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x3, &(0x7f0000001580)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xe0}, 0x0) preadv(r4, &(0x7f0000001c80)=[{&(0x7f00000016c0)=""/79, 0x4f}, {&(0x7f0000001740)=""/46, 0x2e}, {&(0x7f0000001780)=""/151, 0x97}, {&(0x7f0000001840)=""/247, 0xf7}, {&(0x7f0000001940)=""/92, 0x5c}, {&(0x7f00000019c0)=""/112, 0x70}, {&(0x7f0000001a40)=""/249, 0xf9}, {&(0x7f0000001b40)=""/77, 0x4d}, {&(0x7f0000001bc0)=""/177, 0xb1}], 0x9, 0x2, 0x7fffffff) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f00000000c0)={0x7f, 0xc, 0x101, 0x42, "16d9f9aca52821233e4243aee433db21f3340d0fc7e7c240520128142015c788"}) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r5, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r6, &(0x7f00000001c0)=""/267, 0x10b) [ 719.243023][T10483] loop4: detected capacity change from 0 to 224 [ 719.271898][T10482] loop5: detected capacity change from 0 to 224 [ 719.281622][T10457] loop0: detected capacity change from 0 to 1 [ 719.326384][T10457] loop0: p1 p2 p3 p4 [ 719.337927][T10457] loop0: p1 start 10 is beyond EOD, truncated [ 719.344054][T10457] loop0: p2 start 34 is beyond EOD, truncated [ 719.350137][T10457] loop0: p3 start 225 is beyond EOD, truncated [ 719.356280][T10457] loop0: p4 start 2415919104 is beyond EOD, truncated [ 719.360265][T10507] loop4: detected capacity change from 0 to 224 07:35:02 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800240000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:02 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000002200bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000f00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x40, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x60000000}) getdents64(r3, &(0x7f00000001c0)=""/267, 0x10b) 07:35:02 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000002500bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 719.510641][T10521] loop5: detected capacity change from 0 to 224 [ 719.515813][T10522] loop4: detected capacity change from 0 to 224 07:35:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000001000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r1 = eventfd(0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, 0x0) read$usbmon(r2, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r2, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:02 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg(r1, &(0x7f0000000500)=[{{&(0x7f0000000080)=@sco={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)="864717f6e5e54f1fcb064750c2f3cf6a9e518133f6c2d5f67c87a21d2859b436a7fed03f", 0x24}, {&(0x7f0000000380)="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", 0xff}, {&(0x7f0000000480)="6ca52b5c6e350e4d48", 0x9}], 0x3}}], 0x1, 0x20000000) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x10b) [ 719.582297][T10532] loop0: detected capacity change from 0 to 1 [ 719.611043][T10541] loop5: detected capacity change from 0 to 224 [ 719.673149][T10532] loop0: p1 p2 p3 p4 [ 719.679061][T10532] loop0: p1 start 10 is beyond EOD, truncated [ 719.685184][T10532] loop0: p2 start 36 is beyond EOD, truncated [ 719.691318][T10532] loop0: p3 start 225 is beyond EOD, truncated [ 719.697559][T10532] loop0: p4 start 2415919104 is beyond EOD, truncated [ 719.701452][T10557] loop4: detected capacity change from 0 to 224 [ 719.753865][T10532] loop0: detected capacity change from 0 to 1 [ 719.819601][T10532] loop0: p1 p2 p3 p4 [ 719.823928][T10532] loop0: p1 start 10 is beyond EOD, truncated [ 719.830243][T10532] loop0: p2 start 36 is beyond EOD, truncated [ 719.836452][T10532] loop0: p3 start 225 is beyond EOD, truncated [ 719.842646][T10532] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:03 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0xffffffffffffffff, r1) ptrace(0x4208, r1) wait4(0x0, 0x0, 0x1, 0x0) 07:35:03 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000003f00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000001100bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:03 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r1 = eventfd(0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, 0x0) read$usbmon(r2, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r2, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:03 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800250000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) [ 720.246429][T10585] loop4: detected capacity change from 0 to 224 [ 720.249595][T10584] loop5: detected capacity change from 0 to 224 07:35:03 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000004000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000001200bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 720.287451][T10595] loop0: detected capacity change from 0 to 1 07:35:03 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r1 = eventfd(0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, 0x0) read$usbmon(r2, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r2, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 720.351579][T10600] loop5: detected capacity change from 0 to 224 [ 720.365565][T10595] loop0: p1 p2 p3 p4 [ 720.369901][T10595] loop0: p1 start 10 is beyond EOD, truncated [ 720.375994][T10595] loop0: p2 start 37 is beyond EOD, truncated [ 720.382171][T10595] loop0: p3 start 225 is beyond EOD, truncated [ 720.388328][T10595] loop0: p4 start 2415919104 is beyond EOD, truncated [ 720.390474][T10608] loop4: detected capacity change from 0 to 224 07:35:03 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000004800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000001800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:03 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r1 = eventfd(0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=']) read$usbmon(r2, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r2, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 720.499682][T10595] loop0: detected capacity change from 0 to 1 [ 720.551690][T10595] loop0: p1 p2 p3 p4 [ 720.555930][T10595] loop0: p1 start 10 is beyond EOD, truncated [ 720.561646][T10630] loop4: detected capacity change from 0 to 224 [ 720.562211][T10595] loop0: p2 start 37 is beyond EOD, truncated [ 720.574512][T10595] loop0: p3 start 225 is beyond EOD, truncated [ 720.580720][T10595] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000001900bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 720.610272][T10637] loop5: detected capacity change from 0 to 224 [ 720.622288][T10635] 9pnet: Insufficient options for proto=fd [ 720.628492][ T1039] loop0: p1 p2 p3 p4 [ 720.632605][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 720.638753][ T1039] loop0: p2 start 37 is beyond EOD, truncated [ 720.644960][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 720.651235][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated [ 720.717047][T10643] loop4: detected capacity change from 0 to 224 07:35:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0xffffffffffffffff, r1) ptrace(0x4208, r1) wait4(0x0, 0x0, 0x1, 0x0) 07:35:04 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800260000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000004c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000002200bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:04 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r1 = eventfd(0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=']) read$usbmon(r2, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r2, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 721.155791][T10660] 9pnet: Insufficient options for proto=fd [ 721.164128][T10658] loop0: detected capacity change from 0 to 1 [ 721.164636][T10663] loop5: detected capacity change from 0 to 224 [ 721.179595][T10662] loop4: detected capacity change from 0 to 224 07:35:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000015800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000002500bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:04 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r1 = eventfd(0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=']) read$usbmon(r2, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r2, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 721.254878][T10658] loop0: p1 p2 p3 p4 [ 721.259544][T10658] loop0: p1 start 10 is beyond EOD, truncated [ 721.265784][T10658] loop0: p2 start 38 is beyond EOD, truncated [ 721.271988][T10658] loop0: p3 start 225 is beyond EOD, truncated [ 721.278166][T10658] loop0: p4 start 2415919104 is beyond EOD, truncated [ 721.330500][T10684] 9pnet: Insufficient options for proto=fd [ 721.342333][T10685] loop4: detected capacity change from 0 to 224 [ 721.354209][T10686] loop5: detected capacity change from 0 to 224 [ 721.377539][T10658] loop0: detected capacity change from 0 to 1 07:35:04 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008002e0000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000016100bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000004800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:04 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r1 = eventfd(0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX]) read$usbmon(r2, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r2, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 721.409827][T10658] loop0: p1 p2 p3 p4 [ 721.418733][T10658] loop0: p1 start 10 is beyond EOD, truncated [ 721.424891][T10658] loop0: p2 start 38 is beyond EOD, truncated [ 721.431020][T10658] loop0: p3 start 225 is beyond EOD, truncated [ 721.437202][T10658] loop0: p4 start 2415919104 is beyond EOD, truncated [ 721.532233][T10701] 9pnet: Insufficient options for proto=fd [ 721.561308][T10713] loop4: detected capacity change from 0 to 224 [ 721.562239][T10714] loop5: detected capacity change from 0 to 224 [ 721.571584][T10715] loop0: detected capacity change from 0 to 1 [ 721.659534][T10715] loop0: p1 p2 p3 p4 [ 721.665840][T10715] loop0: p1 start 10 is beyond EOD, truncated [ 721.672110][T10715] loop0: p2 start 46 is beyond EOD, truncated [ 721.678169][T10715] loop0: p3 start 225 is beyond EOD, truncated [ 721.684375][T10715] loop0: p4 start 2415919104 is beyond EOD, truncated [ 721.723473][T10715] loop0: detected capacity change from 0 to 1 [ 721.771925][T10715] loop0: p1 p2 p3 p4 [ 721.776295][T10715] loop0: p1 start 10 is beyond EOD, truncated [ 721.782393][T10715] loop0: p2 start 46 is beyond EOD, truncated [ 721.788464][T10715] loop0: p3 start 225 is beyond EOD, truncated [ 721.794764][T10715] loop0: p4 start 2415919104 is beyond EOD, truncated [ 721.849568][ T1039] loop0: p1 p2 p3 p4 [ 721.853709][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 721.859803][ T1039] loop0: p2 start 46 is beyond EOD, truncated [ 721.866032][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 721.872217][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, 0x0) ptrace(0x4208, r1) wait4(0x0, 0x0, 0x1, 0x0) 07:35:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000004c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000006800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:04 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r1 = eventfd(0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX]) read$usbmon(r2, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r2, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:04 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008ad2e0000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000006800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:05 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000006c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 722.020826][T10748] loop4: detected capacity change from 0 to 224 [ 722.030576][T10749] loop5: detected capacity change from 0 to 224 [ 722.039030][T10750] 9pnet: Insufficient options for proto=fd [ 722.047053][T10754] loop0: detected capacity change from 0 to 1 07:35:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r1 = eventfd(0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX]) read$usbmon(r2, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r2, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 722.114303][T10754] loop0: p1 p2 p3 p4 [ 722.129140][T10754] loop0: p1 start 10 is beyond EOD, truncated [ 722.135279][T10754] loop0: p2 start 46 is beyond EOD, truncated [ 722.141379][T10754] loop0: p3 start 225 is beyond EOD, truncated [ 722.147069][T10770] loop4: detected capacity change from 0 to 224 [ 722.147528][T10754] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000006c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:05 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000007400bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 722.155698][T10771] loop5: detected capacity change from 0 to 224 [ 722.177791][T10775] 9pnet: Insufficient options for proto=fd 07:35:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 722.225066][T10754] loop0: detected capacity change from 0 to 1 [ 722.259421][T10754] loop0: p1 p2 p3 p4 [ 722.263619][T10754] loop0: p1 start 10 is beyond EOD, truncated [ 722.269830][T10754] loop0: p2 start 46 is beyond EOD, truncated [ 722.275901][T10754] loop0: p3 start 225 is beyond EOD, truncated [ 722.282184][T10754] loop0: p4 start 2415919104 is beyond EOD, truncated [ 722.297717][T10794] loop5: detected capacity change from 0 to 224 [ 722.308927][T10797] loop4: detected capacity change from 0 to 224 [ 722.321036][T10803] 9pnet: Insufficient options for proto=fd 07:35:05 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000027800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 722.439330][T10813] loop5: detected capacity change from 0 to 224 07:35:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, 0x0) ptrace(0x4208, r1) wait4(0x0, 0x0, 0x1, 0x0) 07:35:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000007400bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:05 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008003e0000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:05 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000027900bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 722.907599][T10829] loop0: detected capacity change from 0 to 1 [ 722.916205][T10831] loop4: detected capacity change from 0 to 224 [ 722.917904][T10830] loop5: detected capacity change from 0 to 224 [ 722.935867][T10832] 9pnet: Insufficient options for proto=fd 07:35:05 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000007a00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000007a00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 722.960633][T10829] loop0: p1 p2 p3 p4 [ 722.965085][T10829] loop0: p1 start 10 is beyond EOD, truncated [ 722.971232][T10829] loop0: p2 start 62 is beyond EOD, truncated [ 722.977406][T10829] loop0: p3 start 225 is beyond EOD, truncated [ 722.983626][T10829] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:06 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008003f0000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) [ 723.031946][T10829] loop0: detected capacity change from 0 to 1 [ 723.060375][T10854] 9pnet: Insufficient options for proto=fd [ 723.072064][T10856] loop4: detected capacity change from 0 to 224 07:35:06 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000018600bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000fe00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:06 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB, @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 723.082257][T10855] loop5: detected capacity change from 0 to 224 [ 723.187150][T10872] 9pnet: Insufficient options for proto=fd [ 723.198610][T10874] loop4: detected capacity change from 0 to 224 [ 723.200617][T10873] loop5: detected capacity change from 0 to 224 [ 723.206159][T10876] loop0: detected capacity change from 0 to 1 [ 723.289261][T10876] loop0: p1 p2 p3 p4 [ 723.293358][T10876] loop0: p1 start 10 is beyond EOD, truncated [ 723.299550][T10876] loop0: p2 start 63 is beyond EOD, truncated [ 723.305782][T10876] loop0: p3 start 225 is beyond EOD, truncated [ 723.311987][T10876] loop0: p4 start 2415919104 is beyond EOD, truncated [ 723.370168][T10876] loop0: detected capacity change from 0 to 1 [ 723.419604][T10876] loop0: p1 p2 p3 p4 [ 723.424316][T10876] loop0: p1 start 10 is beyond EOD, truncated [ 723.430684][T10876] loop0: p2 start 63 is beyond EOD, truncated [ 723.436777][T10876] loop0: p3 start 225 is beyond EOD, truncated [ 723.443023][T10876] loop0: p4 start 2415919104 is beyond EOD, truncated [ 723.450526][ T1039] loop0: p1 p2 p3 p4 [ 723.454890][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 723.460981][ T1039] loop0: p2 start 63 is beyond EOD, truncated [ 723.467141][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 723.473334][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:06 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, 0x0) ptrace(0x4208, r1) wait4(0x0, 0x0, 0x1, 0x0) 07:35:06 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000018700bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000402bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:06 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB, @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:06 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800400000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) [ 723.835630][T10908] loop5: detected capacity change from 0 to 224 [ 723.838945][T10911] loop0: detected capacity change from 0 to 1 [ 723.845113][T10910] loop4: detected capacity change from 0 to 224 [ 723.850432][T10912] 9pnet: Insufficient options for proto=fd 07:35:06 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000029e00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:06 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB, @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000007802bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 723.930864][T10911] loop0: p1 p2 p3 p4 [ 723.935147][T10911] loop0: p1 start 10 is beyond EOD, truncated [ 723.941512][T10911] loop0: p2 start 64 is beyond EOD, truncated [ 723.947588][T10911] loop0: p3 start 225 is beyond EOD, truncated [ 723.953850][T10911] loop0: p4 start 2415919104 is beyond EOD, truncated [ 724.006594][T10930] 9pnet: Insufficient options for proto=fd [ 724.028539][T10933] loop4: detected capacity change from 0 to 224 [ 724.028988][T10934] loop5: detected capacity change from 0 to 224 07:35:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000a602bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:07 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000002a600bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfd', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 724.113029][T10911] loop0: detected capacity change from 0 to 1 [ 724.144597][T10950] 9pnet: Insufficient options for proto=fd [ 724.176589][T10954] loop4: detected capacity change from 0 to 224 [ 724.179599][T10948] loop5: detected capacity change from 0 to 224 [ 724.190023][ T1039] loop0: p1 p2 p3 p4 [ 724.194363][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 724.200523][ T1039] loop0: p2 start 64 is beyond EOD, truncated [ 724.206587][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 724.212784][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated [ 724.221425][T10911] loop0: p1 p2 p3 p4 07:35:07 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000fffe00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 724.225530][T10911] loop0: p1 start 10 is beyond EOD, truncated [ 724.231728][T10911] loop0: p2 start 64 is beyond EOD, truncated [ 724.237787][T10911] loop0: p3 start 225 is beyond EOD, truncated [ 724.244148][T10911] loop0: p4 start 2415919104 is beyond EOD, truncated [ 724.303265][T10972] loop5: detected capacity change from 0 to 224 07:35:07 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x1, 0x0) 07:35:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfd', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000a702bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x10b) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000054440)={0x0, 0x0, "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", "e3f90751969f496433d2176b877a76e3addead0b7f37901b246347e251656a46ed053a485164e3d6ac2577ae5f2fc0afcd95c2b94105a82c8de2ba58940ac246f20c7810f002b929d83dcb5d087bba4ae2c4b2a7691d9b97e604de9339128199c5111c68994bb0c57f747204b7c07c87fca097f7a4b8af8bf21d3d60d44fd6a6c7b4c4b2ae10690bb306b2c56215cc67ed6478bb2044c5facfc57cc89b815421cb23a249cc20deec068126234d70a520933297b0d4c877c6681d545ea15773a203e9693be749dcf2e4c8ec343cb5f144cc5d35c195bb45de230aa83cbb46193cf6588d5c6062fb0c8e1ed471cfe1e0427b35a8528f643afdb855bef0733e3e4414f0fa0b2100f8dda2b2ed58eda2d60e171d504d713c6316e0f55cbb30a4f7f80d295b63170ce97c092320be59e4d30bd033a0e127e1227b030dcaff0b3af950fbecf8d97acb0eb6fff4e763f27416356dbecfdec585dc5cd7c41fb54d6a14fe8d21115818778068f3f70abe7bcf94587dd58e4c0be4bc0a547a8afdc0f6e430883cf09357650840fe839d1b09f1a07ed900a0906fe5b57a879b08adb799bd44a9341ae950211e64e77ff9f4bca6060257525266539afd9aefaf1219a36cfb0e32a26a4abb0f4aa42e4b54b97dba0424860c44f9af1434cab880c7ac3d509f0a543659598ec75224bec7eeddddcb713a5ef81605c9e96030428f14a22245a9f84e234ecfaf459227caf5b69285513811413860f730ac9c0fc5aecf7d9160081d7ac4ed915d217617126d7e4b74b5cc7dbbc4d938f929b5efac7684246cd969828f15354411a43ec498df24215ff18c78a36ba3618cf8370fefaa172d78bd10f92f7510667e0fe90f2eef2fa72fc44dc2dd3a2d9190a993a4cb3ada5c24e615815eb71ee0b0efbb6930cb29e92d80a6b2c54bf6329800919622b8db3225cc37928b51109192290e8db853f9112971e3a0085bdc8306ecb80568c51333073d40cc1473bbecb1035f7d0f61b4c9da1ff3f7afc9990f036a9b3cc16cac28095360cbd94bbef209181fe7d16a452ac209b78c6fcdf27a9e53c121ea3a8f895e31ed3c5e0041e325a8d567b269b26112c7663d2be5d32297260bfa451f5358eaf9f33bfbaa7348410c9e81d7b1e30b3283a5d57baf85824da3ff9921baaa3a928df2c3d649203a9bf435430e80e854054d1be4b83767c4a84ba2f71a57cf985f9e36a0689d76c56185d5d9c2dd0204d04ecc28167fc281a3e126c9058aaa5f4c26bc5beb399e449d79259cc8ecf83341f7f1e5b5ff9845c2d26abe76fbcb352426d0a29ebe2570fea7b6918a091ccea63c02a5515b30d6166f85e652d809467b3e7070c11ab4f4fb8655abfc73848e029b96bda1a3c0c6d06e0eb3f8995e74c0be507c349f5cf1740caa9abf5f87b61aa9d239cb79db2ed8be93a783da18fcc3804e61c189b6439bbdb8a9a1e42f4c2f6534458fb066957d2343c417c48356cd0dd698e095308e32e1cb39469ad8d012ee1e79473fa4235d75d757019e5e205cd18ef90cd409134a9fc8bd611097870504c850bbec4eea23fb2578d322220a99af456a070606170a3a726cecd1e955e997af77d8c995a771fe949b87915a9465d96c46ec041120a219f8383784d61f1419a4781fc571976e5369d1134d10650caa7a80fbea43aaea0097039d9a1c2b26b09e740d421fb16935b7a53ba237958bb735311a61c1aee6007fb4d68180380ac9004dabeeab449d8e2b20e6d6cfa874181df474bf8470b58bd73e7f22828bf4677115c72ad1f5f106a2cd539b91ad82523c5e8bdc0b6e58e74c4bfb7cec426ea62157bd9d0dbd2f53c2206eb41736896f3148b94a9d1898dda05226cb8e5d76c105856279a433f9ce1e8da6f3c3e12473baf7c50632ad3b7d5ca9c247c92029135efdc7fe4fa7670bc1b2f8f199f6b9f3402751fdcf7493f863d7e2868434d200ec704fdb299d3e1535b88c402ad44fddd2aa214c12d6b30f7f6b4d6a9d8d170aaee7f571875ec4a2b31af3e1be68ad07dc7ac240ff0c8ba3967751fba115b2288e32b862afecf58df7b25a6d337cc95c510612840780363f0e79833ea707e458df4cb0dde364900cc9843f80e0cc5fc725ec86493349bec32bf30ddf09109f66fed2f40d05474320494d3a4b57a7b2c50a10d3ed9bd09da7972dd76f6937e985f78eb9bcb322ddddcd9e2304c26781df17e2717192084484ffbe93f3431ad1202dd3ec79106d86a79098eb853f4f1cc63d3925be6a1840a368deed2daadd8bf6ad8671a0340a6cce25df83da448ca1787520867e41ea641fb56396273dc95bed38cfd8b7924c97d6bd7a9c65dd5142a999cd057f6a5c7f094f7c5264103cc26d571aeac56f6f4b8b67810aab8af95fa604babcff85d1fd8c5f152a8b69c36c76579766112b2208b01c6a9a74053bc5f8929639be7ab92768fae48344c31d1379d329d0a72b787ecbda950bded20ce0509ecc51c1fd857e8945000815a0f5e5034044b1f8e1a19c28943e411d4416ba1ae6f9bd38b7f047da23e7e856767d5850391752f39f0405544dd2cf0e05f5ef1fb612f07b6b99225c92a31fa43dcd31822dc2d11db6309770a5e595639bb832ef15a29370e9c6f85ee610ba6e1134b78ddc0563f7b35c1ee270bb797edb2c30c85538627c0e8df1b81a205c6f1db333c2cf32be933b713e27402418ae5dc6398d36f11a75d02b293828e4462bc25313472efb46aab3632a9d97f570154635b07d641c201c73abeda83429c9d3ccb40dbea3cbb80ba6edddbe3f5806c48222b7ad9da8943585be1b6b88fef01ea9d83bb269e172625cb8cf5d208624ad1813fae624f576e37ddf88fe362700a86bea178f37943dd81fc22732a339e2c67d4dfdc27d0285b1046c45339fe63ae233f73e494d9e5c6c25ad7e3f8c7d551cd340daa9574b9c5973d64413cdd1107616e94dcf6c66efd3e0fba6ece0d12400709c94566eb40c056775f3c263b3c49f743b1e31c109af99b72ce642ac205c1115c3f9c19db0f2fec75004b50f472be3b6c4b128560ef5169fec6abf573e251ed79e934aa541a4509c80f53de5d3175bc82fe76661226a2be257d2bad11369857adf1a508154b9b1c2f307937b84231af3d22c5d03d5bc5526df7a1288b8040d5f6d2c82de2a49faf60b0c9221d680438ede10ef7d756027821d94d9e62464cd6feb81d57f6f61ddbedcc21eda73eb35eadb8051010ebbe652c96bef8040d38aa1cb901b49f493c3a91d4e8747cec54b8aeac35459e413b0d40c1d629d395a3f1df8f0d0e0865dd6264d15782310c21939e6baaed328f3c8d2f2a11fa9d8afe383f739ec9bbd28ed585e84ecede9e6c4f656a0d49b20aceda6039d8800a5d009b52f55052a7e41678aff070a299477d38f6e1432d9efa39103cda55288de5630d8a5e4683a468960b0c149fd6377e262ec0920c00c765e5a8133f09b237b37b214fb1efc08f59354f1dbb5b8ca8b827bba316cf656e44b6d0ee1d6774ef503fe47249a81966652cbe218989432e42821c1922ffbb49cbe856b34324cb63984de0ac76b46e197eb3152ab56bdbd2c5027218333b0d0c5191441e9795a144a89316a9a58e56d212a2f9140729f1949149f3faf8934e702003ab086dc8de04d93476d419761fdee19996eef78a6618e58041859aa59b153e9ba8ff5aa36fe47bdda2c33cddea44a0b70a75bf1d747a9811bce9a867180d99647af80912826cfaf6412f3181ed720d1b15aec363d6e3a870401f379a3a487eb6614083f93887fb04a136a186b7e7549176747e0732399556d19267450ce2a19695b56ae29ce887752ff80608f75197bc5d075f5544ee81aacee322de006b88e4b80d81d61d9269d983fb3f20aa649e313be1297e5bf7ad8b9c3f94cf18f8b7cf1b84dd8f0d3580300bf54ddd43c58ec5a0560721820cd954d0df12ecd694bc2cd88256627d127b2ca063bd4b4048a77db08487cf5de38657d0396f85bbb2977510f0b52fa581d57740c6c31675e30fcf646bd18fd63609121257d3114d65e159cb703c95ecac55cc7ef992e29c81331a896511485a9e97ca8b5ac84ceec5f305e3a134b71181a3423e65eb6d066149c4065fe08d8f7eb1b3a4ed5487202ebd0a6bd784ed477c97aa5fdf1c35a29015e11b32a8063a34a98e931cd18ec93713e1b0909678a4cd27cd86453120f0ef71872c8e0439b13b44d6da99f55fbaf210622c96dfdf5f91ff2cfdb4338575f471f184b88e247f650fa2d0653e6ccfa49dae7e063641fc416aab15fa761873819ec2cb3014a3c67b5baef0ae014ea4b9bb36e8df5fc95935880a9492cee37c2fd9fb4a83ede31b253a26cfc73322a9950f885bddec0cbebe136aca19e178ec10df5596aa8a085df813f18073c67e5031cb6672b7809cf37e83f9be991c412acc28f68470dc0868b1aed7d4b2349ffefe128729110ab29cf321be7420d92f1f0168fc29eacb364bb2dba73d26f939dd2664e4dc7418be8268a33887be63745601b843f96361eaf62cfcd92fea84b75ad13bced075e607faa6124c41cffacbc369fe2e576fae0ae34cded4b72ebc593e9a43ec7f359096a6bc2195f61c1bd2c1c81d2610f00ab6c308023f3c354e7dcdf4aae34208a1c6ac6a79b0d971fbf64414361422fc1d687b91984c4d8d4f730b152824783612b19c4df08b9706a6f8903c76183e3834a4a7eae046edc760cf4ef5048208dc6a0b75850ebe220ef7ed9737d63b69854c48045c49bf9a5ee8fa71a3dffada7429873dde281fe6de411a43ef077bbc89d912a9ccd354d8d175e2d5e6e8f188dae3491ae3ee5f3b91fd84e8a67bd30bb0e068a6135b01f7d3a684d1b67689ecdf0a70b8213a1c7df03d6f2cecf5c950ae03fef49b7ac5806acfa0ea476b73c425f94e975be97bd2c2dd11388dfbb523f1be30a692709d971a1cd981c67fd1cf9c16cf9c868f0d3a928bb2ba785e5a4c5fb31005586fc6735a934bf17ed2890d95ed52235ab2521e587af10de3d5c625ea1edbfb45e90ccdbb00b53d67f5f6a4b964c235a35f1e818ebe30627c9c44b28c7fd3ecd114db159c5661eab0aea2bf1e1794369707edfb214ce6b3c0f6994a96f0d9608527ef23506bb78224e64441afc738896f076faa10775c7c0066ab3aef17fff2897d28bde81ce5d40f15f05b1c53325821c777f797c4f202afe2338576cdfe7e551aae267eb49719e82ed7a0f7bdaf16c98e151bd95c92a5a11c1d2466e75868dc12ca80347e9da0f8437870d14af76d7885395eacbbfa7d034dfff4902e62004623ce2e1762dc1f5b0514d63ea45b33c840e4ce70393beafab299bc9ac26282682dcc3433dc68e91f6d3ace551e3578b890f784d6cef94db9c2cbec6f70d37f2033d24c930fd5c249a"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000056440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057840)={0xff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}], 0x8, "a045bf8030ca57"}) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r9}, {}, {r8}, {r8}, {r8}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {r7, r9}, {0x0, r9}, {}, {r8, r9}, {0x0, r9}, {}, {}, {}, {0x0, r9}, {}, {0x0, r9}, {0x0, r9}, {r8}, {0x0, r9}, {}, {}, {r7}, {0x0, r9}, {}, {}, {r7, r9}, {r8}, {}, {0x0, r9}, {r8, r9}, {0x0, r9}, {r7, r9}, {}, {0x0, r9}, {r8}, {}, {}, {r8}, {0x0, r9}, {}, {0x0, r9}, {}, {r7, r9}, {0x0, r9}, {r7}, {}, {r8}, {r7}, {}, {r8, r9}, {}, {0x0, r9}, {0x0, r9}, {}, {0x0, r9}, {r8, r9}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {r8}, {0x0, r9}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {0x0, r9}, {r7}, {0x0, r9}, {}, {}, {r7, r9}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {r8}, {0x0, r9}, {0x0, r9}, {r7}, {r8, r9}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {}, {0x0, r9}, {r7}, {0x0, r9}, {}, {0x0, r9}, {r7, r9}, {0x0, r9}, {r8, r9}, {r7, r9}, {r8}, {}, {r7, r9}, {r7}, {0x0, r9}, {}, {r7}, {0x0, r9}, {}, {}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {}, {}, {r7, r9}, {0x0, r9}, {r8, r9}, {r7, r9}, {0x0, r9}, {}, {}, {r8}, {}, {}, {0x0, r9}, {r7}, {}, {r8}, {}, {0x0, r9}, {r8}, {0x0, r9}, {0x0, r9}, {}, {0x0, r9}, {}, {0x0, r9}, {}, {r7}, {}, {}, {}, {0x0, r9}, {r7, r9}, {r8}, {}, {0x0, r9}, {}, {r8}, {}, {}, {}, {r7}, {r7}, {0x0, r9}, {r7}, {r8, r9}, {0x0, r9}, {r7}, {}, {r7}, {0x0, r9}, {r8}, {r7, r9}, {0x0, r9}, {}, {0x0, r9}, {}, {}, {0x0, r9}, {r8}, {r7}, {}, {r7}, {}, {0x0, r9}, {r8, r9}, {0x0, r9}, {0x0, r9}, {}, {}, {r8, r9}, {r7}, {r8}, {r8, r9}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {r8}, {0x0, r9}, {r7}, {r8}, {r8}, {}, {}, {r8}, {0x0, r9}, {}, {r7, r9}, {r7}, {}, {}, {0x0, r9}, {}, {r8, r9}, {r7}, {0x0, r9}, {}, {}, {r7, r9}, {r8, r9}, {r8}, {r7, r9}, {}, {}, {r8}, {r7, r9}, {0x0, r9}, {}, {0x0, r9}, {r8}, {r8}, {r7}, {}, {r8, r9}, {r8}, {0x0, r9}, {}, {}, {}, {r7, r9}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055300)={0x8f4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x0, "0d4abfd4b32220"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000051a80)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x2, "a25fe846f0b6f5"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000052a80)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {r7, r10}], 0x81, "59ddaa63cfef27"}) 07:35:07 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800480000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:07 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000000fff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 724.666655][T10987] loop4: detected capacity change from 0 to 224 [ 724.684453][T10989] loop0: detected capacity change from 0 to 1 [ 724.692046][T10990] loop5: detected capacity change from 0 to 224 07:35:07 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000feff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 724.712597][T10994] 9pnet: Insufficient options for proto=fd 07:35:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000b802bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfd', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 724.759536][T10989] loop0: p1 p2 p3 p4 [ 724.764016][T10989] loop0: p1 start 10 is beyond EOD, truncated [ 724.770212][T10989] loop0: p2 start 72 is beyond EOD, truncated [ 724.776396][T10989] loop0: p3 start 225 is beyond EOD, truncated [ 724.782861][T10989] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:07 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) poll(&(0x7f0000000080)=[{r0, 0x344}], 0x1, 0x8) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x10b) [ 724.845645][T11020] 9pnet: Insufficient options for proto=fd [ 724.853021][T10989] loop0: detected capacity change from 0 to 1 [ 724.866644][T11019] loop5: detected capacity change from 0 to 224 [ 724.878680][T11027] loop4: detected capacity change from 0 to 224 [ 724.891253][T10989] loop0: p1 p2 p3 p4 07:35:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000003bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 724.896054][T10989] loop0: p1 start 10 is beyond EOD, truncated [ 724.902207][T10989] loop0: p2 start 72 is beyond EOD, truncated [ 724.908478][T10989] loop0: p3 start 225 is beyond EOD, truncated [ 724.914666][T10989] loop0: p4 start 2415919104 is beyond EOD, truncated [ 724.976659][T11041] 9pnet: Insufficient options for proto=fd [ 725.006525][T11047] loop4: detected capacity change from 0 to 224 [ 725.009715][ T1039] loop0: p1 p2 p3 p4 [ 725.017716][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 725.023918][ T1039] loop0: p2 start 72 is beyond EOD, truncated [ 725.030253][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 725.036398][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x1, 0x0) 07:35:08 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000200bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:08 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008004c0000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000204bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:08 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:08 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x3f, 0x9, 0xe0, 0x0, 0x0, 0xffffffff, 0x1, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x7f}, 0x200, 0x6, 0x400, 0x9, 0xc00, 0x7ff, 0x5, 0x0, 0x8000000, 0x0, 0x4}, 0xffffffffffffffff, 0x5, r0, 0xa) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0xdc10}, 0x8, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x3, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r1, 0xf505, 0x0) r4 = getpgrp(0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x40, 0x0, 0x9, 0x4, 0x0, 0x8, 0x4890b, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0xa000, 0x4, 0x1, 0x1, 0x0, 0x6, 0x1d, 0x0, 0x9, 0x0, 0x6a}, r4, 0x5, r5, 0x0) getdents64(r3, &(0x7f00000001c0)=""/267, 0x10b) 07:35:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000604bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:08 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000300bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 725.572655][T11063] 9pnet: Insufficient options for proto=fd [ 725.580475][T11064] loop0: detected capacity change from 0 to 1 [ 725.588081][T11067] loop4: detected capacity change from 0 to 224 [ 725.596367][T11070] loop5: detected capacity change from 0 to 224 [ 725.654417][T11064] loop0: p1 p2 p3 p4 [ 725.658611][T11064] loop0: p1 start 10 is beyond EOD, truncated [ 725.664865][T11064] loop0: p2 start 76 is beyond EOD, truncated [ 725.670982][T11064] loop0: p3 start 225 is beyond EOD, truncated [ 725.677138][T11064] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:08 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:08 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000400bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000005bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 725.711697][T11092] loop4: detected capacity change from 0 to 224 [ 725.718988][T11093] loop5: detected capacity change from 0 to 224 [ 725.761546][T11100] 9pnet: Insufficient options for proto=fd [ 725.796073][T11106] loop4: detected capacity change from 0 to 224 [ 725.803252][T11064] loop0: detected capacity change from 0 to 1 07:35:08 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x2, 0x45) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xed, 0x1, 0x3f, 0x81, 0x0, 0x9, 0x19014, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x40, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x40022, 0x0, 0x50, 0x7, 0xac2, 0x9, 0x100, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0xb, r1, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r3, &(0x7f00000001c0)=""/267, 0x10b) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = fsmount(r0, 0x0, 0x1) ioctl$INCFS_IOC_PERMIT_FILL(r4, 0x40046721, &(0x7f0000000140)={r5}) [ 725.804493][T11111] loop5: detected capacity change from 0 to 224 [ 725.851068][T11064] loop0: p1 p2 p3 p4 [ 725.855921][T11064] loop0: p1 start 10 is beyond EOD, truncated [ 725.862155][T11064] loop0: p2 start 76 is beyond EOD, truncated [ 725.868231][T11064] loop0: p3 start 225 is beyond EOD, truncated [ 725.874503][T11064] loop0: p4 start 2415919104 is beyond EOD, truncated [ 725.948585][ T1039] loop0: p1 p2 p3 p4 [ 725.952940][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 725.959013][ T1039] loop0: p2 start 76 is beyond EOD, truncated [ 725.965478][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 725.971726][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:09 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0xffffffffffffffff, r1) wait4(0x0, 0x0, 0x1, 0x0) 07:35:09 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000500bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000006bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:09 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800600000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:09 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40140, 0x50) execveat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000140)='^\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='/dev/input/event#\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='/dev/bsg\x00'], 0x1000) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x10400, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x101000, 0x0) preadv(r3, &(0x7f00000005c0)=[{&(0x7f0000000580)=""/41, 0x29}], 0x1, 0x8, 0x0) openat(r2, &(0x7f0000000500)='./file0\x00', 0x2000, 0xc) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r4, &(0x7f00000001c0)=""/267, 0x10b) 07:35:09 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000600bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000406bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 726.472136][T11141] 9pnet: Insufficient options for proto=fd [ 726.478701][T11140] loop0: detected capacity change from 0 to 1 [ 726.488477][T11138] loop4: detected capacity change from 0 to 224 [ 726.491846][T11142] loop5: detected capacity change from 0 to 224 [ 726.542743][T11140] loop0: p1 p2 p3 p4 [ 726.546956][T11140] loop0: p1 start 10 is beyond EOD, truncated [ 726.553055][T11140] loop0: p2 start 96 is beyond EOD, truncated [ 726.559237][T11140] loop0: p3 start 225 is beyond EOD, truncated [ 726.565464][T11140] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:09 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r3, &(0x7f00000001c0)=""/267, 0x10b) r4 = fsopen(&(0x7f0000000080)='ocfs2_dlmfs\x00', 0x0) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) copy_file_range(r2, 0x0, r4, &(0x7f00000000c0)=0x5b, 0xdd, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000380)={0x1, 0x80, 0xff, 0x7f, 0x5, 0x40, 0x0, 0x7, 0x11001, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x101, 0x4, @perf_config_ext={0x5, 0x6}, 0x0, 0x4, 0x0, 0x2, 0x6, 0x1, 0x8, 0x0, 0x73, 0x0, 0x8}) 07:35:09 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000700bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000007bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 726.638775][T11172] 9pnet: Insufficient options for proto=fd [ 726.640101][T11167] loop5: detected capacity change from 0 to 224 [ 726.650617][T11168] loop4: detected capacity change from 0 to 224 [ 726.663838][T11140] loop0: detected capacity change from 0 to 1 [ 726.709852][T11140] loop0: p1 p2 p3 p4 [ 726.714484][T11140] loop0: p1 start 10 is beyond EOD, truncated [ 726.720727][T11140] loop0: p2 start 96 is beyond EOD, truncated [ 726.726790][T11140] loop0: p3 start 225 is beyond EOD, truncated [ 726.732961][T11140] loop0: p4 start 2415919104 is beyond EOD, truncated [ 726.737546][T11190] loop5: detected capacity change from 0 to 224 [ 726.757674][ T1039] loop0: p1 p2 p3 p4 [ 726.757951][T11194] loop4: detected capacity change from 0 to 224 [ 726.764898][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 726.774547][ T1039] loop0: p2 start 96 is beyond EOD, truncated [ 726.780804][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 726.787451][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:10 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, 0x0) wait4(0x0, 0x0, 0x1, 0x0) 07:35:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:10 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800680000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000009bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:10 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x10b) r2 = socket$inet(0x2, 0x3, 0x8001) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000380)) 07:35:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000abf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 727.364420][T11222] loop4: detected capacity change from 0 to 224 [ 727.366026][T11221] loop5: detected capacity change from 0 to 224 [ 727.375074][T11223] 9pnet: Insufficient options for proto=fd [ 727.377747][T11225] loop0: detected capacity change from 0 to 1 07:35:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000900bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000bbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 727.461455][T11240] loop4: detected capacity change from 0 to 224 [ 727.482825][T11242] loop5: detected capacity change from 0 to 224 [ 727.496692][T11225] loop0: p1 p2 p3 p4 [ 727.501424][T11225] loop0: p1 start 10 is beyond EOD, truncated [ 727.507508][T11225] loop0: p2 start 104 is beyond EOD, truncated [ 727.513687][T11225] loop0: p3 start 225 is beyond EOD, truncated [ 727.515911][T11253] 9pnet: Insufficient options for proto=fd [ 727.519891][T11225] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000a00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 727.574621][T11263] loop4: detected capacity change from 0 to 224 [ 727.603610][T11225] loop0: detected capacity change from 0 to 1 [ 727.655788][T11276] loop5: detected capacity change from 0 to 224 [ 727.656728][T11277] 9pnet: Insufficient options for proto=fd [ 727.672170][T11225] loop0: p1 p2 p3 p4 [ 727.678152][T11225] loop0: p1 start 10 is beyond EOD, truncated [ 727.684288][T11225] loop0: p2 start 104 is beyond EOD, truncated [ 727.690556][T11225] loop0: p3 start 225 is beyond EOD, truncated [ 727.696704][T11225] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:11 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, 0x0) wait4(0x0, 0x0, 0x1, 0x0) 07:35:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:11 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e22, @loopback}, 0x10) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x10b) 07:35:11 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000b00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:11 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008006c0000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:11 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:11 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:11 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000dbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 728.256418][T11291] 9pnet: Insufficient options for proto=fd [ 728.267037][T11294] loop5: detected capacity change from 0 to 224 [ 728.277784][T11295] loop4: detected capacity change from 0 to 224 [ 728.283405][T11296] loop0: detected capacity change from 0 to 1 [ 728.342966][T11296] loop0: p1 p2 p3 p4 [ 728.347220][T11296] loop0: p1 start 10 is beyond EOD, truncated [ 728.353716][T11296] loop0: p2 start 108 is beyond EOD, truncated [ 728.359917][T11296] loop0: p3 start 225 is beyond EOD, truncated [ 728.366125][T11296] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000ebf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 728.407276][T11322] loop4: detected capacity change from 0 to 224 [ 728.413088][T11323] loop5: detected capacity change from 0 to 224 07:35:11 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000d00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 728.450343][T11296] loop0: detected capacity change from 0 to 1 [ 728.479793][T11296] loop0: p1 p2 p3 p4 [ 728.488563][T11296] loop0: p1 start 10 is beyond EOD, truncated 07:35:11 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 728.493362][T11333] loop4: detected capacity change from 0 to 224 [ 728.494685][T11296] loop0: p2 start 108 is beyond EOD, truncated [ 728.507106][T11296] loop0: p3 start 225 is beyond EOD, truncated [ 728.513285][T11296] loop0: p4 start 2415919104 is beyond EOD, truncated [ 728.557986][T11344] loop5: detected capacity change from 0 to 224 07:35:12 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, 0x0) wait4(0x0, 0x0, 0x1, 0x0) 07:35:12 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000fbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:12 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x8, 0x0) fcntl$setlease(r1, 0x400, 0x1) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x10b) 07:35:12 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000e00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:12 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800740000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:12 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:12 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000002010bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 729.163471][T11368] loop0: detected capacity change from 0 to 1 [ 729.173030][T11369] loop5: detected capacity change from 0 to 224 [ 729.182883][T11366] loop4: detected capacity change from 0 to 224 07:35:12 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000f00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:12 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:12 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000001000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 729.230180][T11368] loop0: p1 p2 p3 p4 [ 729.234771][T11368] loop0: p1 start 10 is beyond EOD, truncated [ 729.240892][T11368] loop0: p2 start 116 is beyond EOD, truncated [ 729.247326][T11368] loop0: p3 start 225 is beyond EOD, truncated [ 729.253704][T11368] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:12 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/cgroup', 0x180, 0x9) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f00000000c0)={0x1, 0xd, 0x401, 0x2, "6d648f0245d260d1ed7564d4b419f01d398594cde5ab48be820ee4e37fae98e1"}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x10b) [ 729.308143][T11399] loop4: detected capacity change from 0 to 224 [ 729.309828][T11368] loop0: detected capacity change from 0 to 1 07:35:12 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000011bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 729.387548][T11416] loop5: detected capacity change from 0 to 224 [ 729.442100][T11429] loop4: detected capacity change from 0 to 224 07:35:12 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) wait4(0x0, 0x0, 0x0, 0x0) 07:35:12 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008007a0000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:12 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000001100bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:12 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:12 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000012bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:12 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000080)="3bd5949f0afa33c43d0f4e39d3f0f784a90de5a796496db0982caae7ba4889c3e2b405fcecf242ff6a6faa11c3e6bbff7e9a04f6e1bcb85c8f24cd993ec3654fab212826218f7369ef6b8b224da630fc8895dbd22f61058850941f990c7f125c24b43b21f1406018fec3a4e1dca67d2338c01952aa67e55d124bc443f16012", 0x7f) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x8, 0x0) r3 = openat(r2, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = syz_io_uring_complete(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r0, &(0x7f0000001500)={0x4}) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000380)='./file0\x00', 0xff, 0x2, &(0x7f0000001440)=[{&(0x7f00000003c0)="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", 0x1000, 0x1}, {&(0x7f00000013c0)="f7f0b25ee6acf756c1330e7bef0c61540f35d0f9eba68ebf4f0560bded6f13f4b9f76b000f9ac06d7e74d25f2d8e64dcfc6f44223887840171773d0dfc4015f0b94301f2", 0x44, 0x3}], 0x10, &(0x7f0000001480)={[{@huge_advise}, {@huge_always}, {@uid={'uid', 0x3d, 0xee01}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70]}}], [{@subj_user={'subj_user', 0x3d, '\xc8:'}}]}) perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0x0, 0x0, 0x0, 0xff, 0x4, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}, 0x0, 0x0, 0x6, 0x9}, 0x0, 0x0, r3, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r5, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r6, &(0x7f00000001c0)=""/267, 0x10b) 07:35:13 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000018bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:13 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000001200bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:13 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 730.049770][T11443] loop4: detected capacity change from 0 to 224 [ 730.056478][T11445] loop0: detected capacity change from 0 to 1 [ 730.063844][T11446] loop5: detected capacity change from 0 to 224 [ 730.149422][T11445] loop0: p1 p2 p3 p4 [ 730.153857][T11445] loop0: p1 start 10 is beyond EOD, truncated [ 730.160002][T11445] loop0: p2 start 122 is beyond EOD, truncated [ 730.163671][T11471] loop4: detected capacity change from 0 to 224 [ 730.166473][T11445] loop0: p3 start 225 is beyond EOD, truncated [ 730.166491][T11445] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:13 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000001800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:13 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000004c0)=""/270, 0x10e) r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r2, 0x8008f513, &(0x7f00000000c0)) 07:35:13 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 730.201818][T11476] loop5: detected capacity change from 0 to 224 [ 730.261540][T11445] loop0: detected capacity change from 0 to 1 [ 730.296592][T11488] 9pnet: Could not find request transport: fd0x0000000000000006 [ 730.305080][T11490] loop5: detected capacity change from 0 to 224 07:35:13 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) wait4(0x0, 0x0, 0x0, 0x0) 07:35:13 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000019bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:13 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000804800000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:13 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000001900bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:13 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x146) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}, 0x10, 0x3f, 0x0, 0x6, 0x0, 0x0, 0x72cc, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="9a435964a01868decec7cff6e9c7d4dee693d3a8128e0452846a16a82f9d899eac6aabbd918e5c4e6906a3e7c94b2cd015958baf174a963db68fffc68a1bcb0b3204b13d8c10486d245002a03e69090330b45ed69532b9bc5ca23e74e70731cd7bd70450546377060017b24858786cd76adb1d4088f9d2089c0418be294318e64c8054f9baba620a60e39be2339725ed3f30fa78de2c18cde462a555083504173ee10dd195ae177318e69ffca95e4d7e4d21390846cdf00a4a3b22beefbf65beb5bbab847950c1a0331c769e38bf6d3ddc00", 0xd2) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000500)=""/219) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_io_uring_setup(0x88, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x3000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000002880)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x3, 0x0, 0x1, 0x3, &(0x7f0000002780)="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", 0x7, 0x0, 0x0, {0x1, r5}}, 0x71) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000700)=@IORING_OP_CLOSE={0x13, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x6) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x54, 0x7fff, 0x8, {0x1ff}, {0x6a, 0xfff}, @rumble={0x2}}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) accept4$unix(r0, &(0x7f0000000480)=@abs, &(0x7f0000000140)=0x6e, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000080)={0x4, 0x3, 0x3e85, 0x9, "513bdee379b5e7940f03ddba5a440b6079df615a2cbb0dd4d2d57f0301b8dd26"}) getdents64(r6, &(0x7f00000001c0)=""/267, 0x10b) 07:35:13 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000002200bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:13 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000001020bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 730.942430][T11503] 9pnet: Could not find request transport: fd0x0000000000000006 [ 730.953517][T11506] loop5: detected capacity change from 0 to 224 [ 730.960745][T11511] loop0: detected capacity change from 0 to 1 [ 730.960964][T11507] loop4: detected capacity change from 0 to 224 07:35:14 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 731.011667][T11511] loop0: p1 p2 p3 p4 [ 731.017590][T11511] loop0: p1 start 10 is beyond EOD, truncated [ 731.023718][T11511] loop0: p2 start 128 is beyond EOD, truncated [ 731.030000][T11511] loop0: p3 start 225 is beyond EOD, truncated [ 731.037198][T11511] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:14 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000022bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 731.073789][T11532] loop4: detected capacity change from 0 to 224 [ 731.095970][T11511] loop0: detected capacity change from 0 to 1 [ 731.113795][T11545] loop5: detected capacity change from 0 to 224 07:35:14 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000002500bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:14 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x3, 0x4, 0x2000000000, 0x88100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4}, 0x0, 0x4, r0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x10b) [ 731.142785][T11550] 9pnet: Could not find request transport: fd0x0000000000000006 [ 731.143028][T11511] loop0: p1 p2 p3 p4 [ 731.158626][T11511] loop0: p1 start 10 is beyond EOD, truncated [ 731.164770][T11511] loop0: p2 start 128 is beyond EOD, truncated [ 731.170949][T11511] loop0: p3 start 225 is beyond EOD, truncated [ 731.177262][T11511] loop0: p4 start 2415919104 is beyond EOD, truncated [ 731.203583][T11559] loop4: detected capacity change from 0 to 224 [ 731.239265][T11566] loop5: detected capacity change from 0 to 224 [ 731.250899][ T1039] loop0: p1 p2 p3 p4 [ 731.255005][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 731.261089][ T1039] loop0: p2 start 128 is beyond EOD, truncated [ 731.267351][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 731.273708][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:14 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) wait4(0x0, 0x0, 0x0, 0x0) 07:35:14 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00', 0x3) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000380)=""/168, 0xa8}], 0x1, 0x6, 0xd0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r2 = syz_io_uring_setup(0x88, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x3000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000180)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000002880)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x3, 0x0, 0x1, 0x3, &(0x7f0000002780)="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", 0x7, 0x0, 0x0, {0x1, r5}}, 0x71) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x1, 0x1, {0x3, r5}}, 0xebef) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r6, &(0x7f00000001c0)=""/267, 0x10b) 07:35:14 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800900000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:14 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:14 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000025bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:14 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000004800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:14 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000003fbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 731.841241][T11584] 9pnet: Insufficient options for proto=fd [ 731.852283][T11585] loop4: detected capacity change from 0 to 224 [ 731.858898][T11586] loop0: detected capacity change from 0 to 1 [ 731.865523][T11587] loop5: detected capacity change from 0 to 224 07:35:14 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000004c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:14 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 731.909724][T11586] loop0: p1 p2 p3 p4 [ 731.914182][T11586] loop0: p1 start 10 is beyond EOD, truncated [ 731.920476][T11586] loop0: p2 start 144 is beyond EOD, truncated [ 731.926619][T11586] loop0: p3 start 225 is beyond EOD, truncated [ 731.932825][T11586] loop0: p4 start 2415919104 is beyond EOD, truncated [ 731.959743][T11607] loop4: detected capacity change from 0 to 224 [ 731.999063][T11620] 9pnet: Insufficient options for proto=fd 07:35:14 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00082ead0000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:14 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000040bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:14 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000006800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 732.003142][T11619] loop5: detected capacity change from 0 to 224 [ 732.061359][T11627] loop0: detected capacity change from 0 to 1 [ 732.080534][T11631] loop4: detected capacity change from 0 to 224 [ 732.106549][T11638] loop5: detected capacity change from 0 to 224 [ 732.118897][T11627] loop0: p1 p2 p3 p4 [ 732.133989][T11627] loop0: p1 start 10 is beyond EOD, truncated [ 732.140124][T11627] loop0: p2 start 173 is beyond EOD, truncated [ 732.146299][T11627] loop0: p3 start 225 is beyond EOD, truncated [ 732.152480][T11627] loop0: p4 start 2415919104 is beyond EOD, truncated [ 732.189682][T11627] loop0: detected capacity change from 0 to 1 [ 732.211698][T11627] loop0: p1 p2 p3 p4 [ 732.215919][T11627] loop0: p1 start 10 is beyond EOD, truncated [ 732.222289][T11627] loop0: p2 start 173 is beyond EOD, truncated [ 732.228497][T11627] loop0: p3 start 225 is beyond EOD, truncated [ 732.234757][T11627] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:15 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800c00000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:15 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000048bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:15 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:15 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000006c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:15 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000540)={0x0}, &(0x7f0000000580)=0xc) perf_event_open(&(0x7f00000004c0)={0x37217fd38f09c304, 0x80, 0x7, 0x1f, 0xf8, 0x2, 0x0, 0x0, 0x1250a, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xf3b, 0x2, @perf_config_ext={0xd, 0x14}, 0x45485, 0x6, 0x3, 0xc, 0x7, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, r2, 0xc, r1, 0x1) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r5, 0x8, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) write$evdev(r5, &(0x7f0000000400)=[{{r6, r7/1000+60000}, 0x14, 0x2, 0x800}, {{0x0, 0x2710}, 0x1f, 0x6, 0x6}, {{r8, r9/1000+10000}, 0x3, 0x6, 0xffff}, {{0x77359400}, 0x1, 0x7ff, 0x9}, {{}, 0x15, 0x3, 0x8}, {{0x0, 0xea60}, 0x0, 0x7, 0x3}, {{0x0, 0xea60}, 0x2, 0xfffe, 0x3}, {{r10, r11/1000+10000}, 0x2, 0x5, 0x3}], 0xc0) r12 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r12, 0x40284504, &(0x7f00000000c0)={0x4, 0x1, 0xfff7, 0x6, "0ef59842ab3054a5379878346d29646f77b35dbaaab7737e5954748ab9ed4bec"}) fcntl$notify(0xffffffffffffffff, 0x8, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000005c0)=@known='trusted.overlay.metacopy\x00') getdents64(r4, &(0x7f00000001c0)=""/267, 0x10b) 07:35:15 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r1, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) clone(0xa040000, &(0x7f0000001100)="ab07ad6193fbb2e18100e4c9d6b4a3ce6006f3c901edb3af6920c0c7335e076863ea9ef8e388505eb2d3d09f4acc134f5ee4aad6f14899f5eca13c02ddde49321942ce308a1b4ae47d591c4c2dfe228b6f5915b39d99109f3626a18486b889c81f3546cae0da57cb0457f0bc9a8ae64104dcb16c2513cb797a50d3f509db1f6838fc494981ea4e547961e5d7360031720c3452a5ce07a969908409c441c558defb779959f8c51aafc4b2dab5ee12e0cd62c5be7e03fc07e15cba903917d4937bc5ce", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)="0f28cc175d3b381710149e4ceea328f5667368499489bf7ca11d470fa3504bdd03caa928a7d8005467df45003d198af66d955d787979365cb2720e1e131862509125a03b88a44d3018abe8c9b5504129e69f2fd9af1bdd356f40e2346c2f78a7f7ba04587d906c12e1919d0d3611ae8e1313565998") wait4(0x0, 0x0, 0x40000000, 0x0) mmap(&(0x7f0000029000/0x3000)=nil, 0x3000, 0xc, 0x40010, r0, 0x505ab000) preadv(r3, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r4, &(0x7f00000001c0)=""/267, 0x10b) [ 732.763338][T11664] loop4: detected capacity change from 0 to 224 [ 732.766959][T11665] loop0: detected capacity change from 0 to 1 [ 732.774551][T11668] loop5: detected capacity change from 0 to 224 [ 732.778252][T11670] 9pnet: Insufficient options for proto=fd 07:35:15 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000004cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:15 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000007400bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:15 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 732.859690][T11665] loop0: p1 p2 p3 p4 [ 732.864032][T11665] loop0: p1 start 10 is beyond EOD, truncated [ 732.870166][T11665] loop0: p2 start 192 is beyond EOD, truncated [ 732.876479][T11665] loop0: p3 start 225 is beyond EOD, truncated [ 732.882688][T11665] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:15 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x101200, 0x0) io_uring_enter(r1, 0x7dce, 0xd0f9, 0x23064fed9e627e1a, &(0x7f00000000c0)={[0x2]}, 0x8) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x10b) 07:35:15 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r1, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) clone(0xa040000, &(0x7f0000001100)="ab07ad6193fbb2e18100e4c9d6b4a3ce6006f3c901edb3af6920c0c7335e076863ea9ef8e388505eb2d3d09f4acc134f5ee4aad6f14899f5eca13c02ddde49321942ce308a1b4ae47d591c4c2dfe228b6f5915b39d99109f3626a18486b889c81f3546cae0da57cb0457f0bc9a8ae64104dcb16c2513cb797a50d3f509db1f6838fc494981ea4e547961e5d7360031720c3452a5ce07a969908409c441c558defb779959f8c51aafc4b2dab5ee12e0cd62c5be7e03fc07e15cba903917d4937bc5ce", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)="0f28cc175d3b381710149e4ceea328f5667368499489bf7ca11d470fa3504bdd03caa928a7d8005467df45003d198af66d955d787979365cb2720e1e131862509125a03b88a44d3018abe8c9b5504129e69f2fd9af1bdd356f40e2346c2f78a7f7ba04587d906c12e1919d0d3611ae8e1313565998") wait4(0x0, 0x0, 0x40000000, 0x0) mmap(&(0x7f0000029000/0x3000)=nil, 0x3000, 0xc, 0x40010, r0, 0x505ab000) preadv(r3, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r4, &(0x7f00000001c0)=""/267, 0x10b) 07:35:15 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080acb0000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:15 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000068bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 732.933378][T11694] loop5: detected capacity change from 0 to 224 [ 732.939948][T11665] loop0: detected capacity change from 0 to 1 [ 732.947048][T11695] loop4: detected capacity change from 0 to 224 [ 732.958475][T11692] 9pnet: Insufficient options for proto=fd 07:35:15 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000007a00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:15 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 733.068497][T11717] 9pnet: Insufficient options for proto=fd [ 733.096264][T11722] loop0: detected capacity change from 0 to 1 [ 733.111500][T11727] loop4: detected capacity change from 0 to 224 07:35:16 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000fe00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000006cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 733.113834][T11728] loop5: detected capacity change from 0 to 224 [ 733.131698][T11722] loop0: p1 p2 p3 p4 [ 733.138565][T11722] loop0: p1 start 10 is beyond EOD, truncated [ 733.144700][T11722] loop0: p2 start 203 is beyond EOD, truncated [ 733.150874][T11722] loop0: p3 start 225 is beyond EOD, truncated [ 733.157023][T11722] loop0: p4 start 2415919104 is beyond EOD, truncated [ 733.209508][T11722] loop0: detected capacity change from 0 to 1 [ 733.249501][T11722] loop0: p1 p2 p3 p4 07:35:16 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080acc0000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:16 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000005801bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 733.253889][T11722] loop0: p1 start 10 is beyond EOD, truncated [ 733.256772][T11748] 9pnet: Insufficient options for proto=fd [ 733.260112][T11722] loop0: p2 start 203 is beyond EOD, truncated [ 733.272083][T11722] loop0: p3 start 225 is beyond EOD, truncated [ 733.278422][T11722] loop0: p4 start 2415919104 is beyond EOD, truncated [ 733.285868][T11747] loop5: detected capacity change from 0 to 224 [ 733.295236][T11750] loop4: detected capacity change from 0 to 224 07:35:16 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x1, 0x1, 0x80, 0x6, 0x0, 0x1, 0x8050, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000080)}, 0x40080, 0x9, 0x80000000, 0x2, 0x80000000, 0xdd, 0x2, 0x0, 0x10000, 0x0, 0x2b}, r1, 0x2, r0, 0x9) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x24ae02, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r3, r4) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r5, &(0x7f00000001c0)=""/267, 0x10b) 07:35:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(0xffffffffffffffff, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:16 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r1, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) clone(0xa040000, &(0x7f0000001100)="ab07ad6193fbb2e18100e4c9d6b4a3ce6006f3c901edb3af6920c0c7335e076863ea9ef8e388505eb2d3d09f4acc134f5ee4aad6f14899f5eca13c02ddde49321942ce308a1b4ae47d591c4c2dfe228b6f5915b39d99109f3626a18486b889c81f3546cae0da57cb0457f0bc9a8ae64104dcb16c2513cb797a50d3f509db1f6838fc494981ea4e547961e5d7360031720c3452a5ce07a969908409c441c558defb779959f8c51aafc4b2dab5ee12e0cd62c5be7e03fc07e15cba903917d4937bc5ce", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)="0f28cc175d3b381710149e4ceea328f5667368499489bf7ca11d470fa3504bdd03caa928a7d8005467df45003d198af66d955d787979365cb2720e1e131862509125a03b88a44d3018abe8c9b5504129e69f2fd9af1bdd356f40e2346c2f78a7f7ba04587d906c12e1919d0d3611ae8e1313565998") wait4(0x0, 0x0, 0x40000000, 0x0) mmap(&(0x7f0000029000/0x3000)=nil, 0x3000, 0xc, 0x40010, r0, 0x505ab000) preadv(r3, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r4, &(0x7f00000001c0)=""/267, 0x10b) 07:35:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000074bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:16 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000006101bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 733.385701][T11771] loop5: detected capacity change from 0 to 224 [ 733.400757][T11773] loop0: detected capacity change from 0 to 1 07:35:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(0xffffffffffffffff, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 733.436605][T11784] loop4: detected capacity change from 0 to 224 [ 733.443611][T11773] loop0: p1 p2 p3 p4 [ 733.453551][T11773] loop0: p1 start 10 is beyond EOD, truncated [ 733.459679][T11773] loop0: p2 start 204 is beyond EOD, truncated [ 733.459743][T11785] loop5: detected capacity change from 0 to 224 [ 733.465819][T11773] loop0: p3 start 225 is beyond EOD, truncated [ 733.465837][T11773] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000278bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:16 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000008601bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:16 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = signalfd4(r0, &(0x7f00000003c0)={[0xfffffffffffffff9]}, 0x8, 0x80800) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000400)={0x11}) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r3, &(0x7f00000001c0)=""/267, 0x10b) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$NL80211_CMD_STOP_NAN(r4, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8281a020}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x2, 0x61}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) 07:35:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(0xffffffffffffffff, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 733.576634][T11799] loop4: detected capacity change from 0 to 224 [ 733.589858][T11773] loop0: detected capacity change from 0 to 1 [ 733.612758][T11808] loop5: detected capacity change from 0 to 224 [ 733.630656][T11773] loop0: p1 p2 p3 p4 [ 733.635242][T11773] loop0: p1 start 10 is beyond EOD, truncated [ 733.641339][T11773] loop0: p2 start 204 is beyond EOD, truncated [ 733.647502][T11773] loop0: p3 start 225 is beyond EOD, truncated [ 733.653691][T11773] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:16 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080ace0000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000007abf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:16 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r1, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) clone(0xa040000, &(0x7f0000001100)="ab07ad6193fbb2e18100e4c9d6b4a3ce6006f3c901edb3af6920c0c7335e076863ea9ef8e388505eb2d3d09f4acc134f5ee4aad6f14899f5eca13c02ddde49321942ce308a1b4ae47d591c4c2dfe228b6f5915b39d99109f3626a18486b889c81f3546cae0da57cb0457f0bc9a8ae64104dcb16c2513cb797a50d3f509db1f6838fc494981ea4e547961e5d7360031720c3452a5ce07a969908409c441c558defb779959f8c51aafc4b2dab5ee12e0cd62c5be7e03fc07e15cba903917d4937bc5ce", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)="0f28cc175d3b381710149e4ceea328f5667368499489bf7ca11d470fa3504bdd03caa928a7d8005467df45003d198af66d955d787979365cb2720e1e131862509125a03b88a44d3018abe8c9b5504129e69f2fd9af1bdd356f40e2346c2f78a7f7ba04587d906c12e1919d0d3611ae8e1313565998") wait4(0x0, 0x0, 0x40000000, 0x0) mmap(&(0x7f0000029000/0x3000)=nil, 0x3000, 0xc, 0x40010, r0, 0x505ab000) preadv(r3, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 07:35:16 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000008701bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, 0x0, 0x0) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000000002a6bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 733.739874][T11828] loop4: detected capacity change from 0 to 224 [ 733.754152][T11830] loop0: detected capacity change from 0 to 1 07:35:16 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140)="03fbccb26b15ff4588b6e46ce327eb8189fc", 0x12, 0x800}, {&(0x7f0000000380)="6d42c82f29a3fc27de964832499bd2614339df87ee024dbed67e20841918856da1f19f61422d79846c0cad0ef5b3abc237d563b0edd0ba57c4fc61a698e2522d55a887aaf5bb347bca76a3909ab89a72c10c9463d8e83f1f61c28e218dc421c109613f06fb076fd9ab2964cb97f158f52cc1fa06cb889108145532c2c8bf4adc46a8299f7e3e73d3b8b38abe00db094e670f8d37c1376010df619ecf3ec1f383eb12053b94168f64595dd9b9ddb7cb0df8191db71bed9d", 0xb7, 0xffff}], 0x4002, &(0x7f0000000480)={[{@shortname_mixed}, {@shortname_lower}], [{@obj_role={'obj_role', 0x3d, ')'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@subj_type={'subj_type', 0x3d, '/dev/bsg\x00'}}, {@seclabel}]}) getdents64(r2, &(0x7f00000001c0)=""/267, 0x10b) 07:35:16 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000402bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 733.784668][T11840] loop5: detected capacity change from 0 to 224 [ 733.816336][T11830] loop0: p1 p2 p3 p4 07:35:16 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r1, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) clone(0xa040000, &(0x7f0000001100)="ab07ad6193fbb2e18100e4c9d6b4a3ce6006f3c901edb3af6920c0c7335e076863ea9ef8e388505eb2d3d09f4acc134f5ee4aad6f14899f5eca13c02ddde49321942ce308a1b4ae47d591c4c2dfe228b6f5915b39d99109f3626a18486b889c81f3546cae0da57cb0457f0bc9a8ae64104dcb16c2513cb797a50d3f509db1f6838fc494981ea4e547961e5d7360031720c3452a5ce07a969908409c441c558defb779959f8c51aafc4b2dab5ee12e0cd62c5be7e03fc07e15cba903917d4937bc5ce", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)="0f28cc175d3b381710149e4ceea328f5667368499489bf7ca11d470fa3504bdd03caa928a7d8005467df45003d198af66d955d787979365cb2720e1e131862509125a03b88a44d3018abe8c9b5504129e69f2fd9af1bdd356f40e2346c2f78a7f7ba04587d906c12e1919d0d3611ae8e1313565998") wait4(0x0, 0x0, 0x40000000, 0x0) mmap(&(0x7f0000029000/0x3000)=nil, 0x3000, 0xc, 0x40010, r0, 0x505ab000) preadv(r3, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) 07:35:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, 0x0, 0x0) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:16 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000007802bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 733.829759][T11830] loop0: p1 start 10 is beyond EOD, truncated [ 733.836053][T11830] loop0: p2 start 206 is beyond EOD, truncated [ 733.842385][T11830] loop0: p3 start 225 is beyond EOD, truncated [ 733.848883][T11830] loop0: p4 start 2415919104 is beyond EOD, truncated [ 733.850566][T11853] loop4: detected capacity change from 0 to 224 [ 733.866682][T11855] loop5: detected capacity change from 0 to 224 07:35:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000000002a7bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 733.929472][T11830] loop0: detected capacity change from 0 to 1 [ 733.964334][T11865] loop5: detected capacity change from 0 to 224 07:35:16 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080ad10000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:17 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) ioctl$int_out(r0, 0x2a32, &(0x7f00000000c0)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x10b) 07:35:17 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000007902bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 733.985276][T11830] loop0: p1 p2 p3 p4 [ 733.991743][T11830] loop0: p1 start 10 is beyond EOD, truncated [ 733.994223][T11881] loop4: detected capacity change from 0 to 224 [ 733.997843][T11830] loop0: p2 start 206 is beyond EOD, truncated [ 733.997859][T11830] loop0: p3 start 225 is beyond EOD, truncated [ 734.016772][T11830] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:17 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, 0x0, 0x0) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:17 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r1, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) clone(0xa040000, &(0x7f0000001100)="ab07ad6193fbb2e18100e4c9d6b4a3ce6006f3c901edb3af6920c0c7335e076863ea9ef8e388505eb2d3d09f4acc134f5ee4aad6f14899f5eca13c02ddde49321942ce308a1b4ae47d591c4c2dfe228b6f5915b39d99109f3626a18486b889c81f3546cae0da57cb0457f0bc9a8ae64104dcb16c2513cb797a50d3f509db1f6838fc494981ea4e547961e5d7360031720c3452a5ce07a969908409c441c558defb779959f8c51aafc4b2dab5ee12e0cd62c5be7e03fc07e15cba903917d4937bc5ce", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)="0f28cc175d3b381710149e4ceea328f5667368499489bf7ca11d470fa3504bdd03caa928a7d8005467df45003d198af66d955d787979365cb2720e1e131862509125a03b88a44d3018abe8c9b5504129e69f2fd9af1bdd356f40e2346c2f78a7f7ba04587d906c12e1919d0d3611ae8e1313565998") wait4(0x0, 0x0, 0x40000000, 0x0) mmap(&(0x7f0000029000/0x3000)=nil, 0x3000, 0xc, 0x40010, r0, 0x505ab000) preadv(r2, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000000002b8bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:17 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000009e02bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:17 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) [ 734.110656][T11900] loop0: detected capacity change from 0 to 1 [ 734.114678][T11897] loop5: detected capacity change from 0 to 224 [ 734.169659][T11900] loop0: p1 p2 p3 p4 [ 734.174563][T11900] loop0: p1 start 10 is beyond EOD, truncated [ 734.180704][T11900] loop0: p2 start 209 is beyond EOD, truncated [ 734.186845][T11900] loop0: p3 start 225 is beyond EOD, truncated [ 734.193012][T11900] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:17 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000a602bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000fffebf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:17 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) clone(0xa040000, &(0x7f0000001100)="ab07ad6193fbb2e18100e4c9d6b4a3ce6006f3c901edb3af6920c0c7335e076863ea9ef8e388505eb2d3d09f4acc134f5ee4aad6f14899f5eca13c02ddde49321942ce308a1b4ae47d591c4c2dfe228b6f5915b39d99109f3626a18486b889c81f3546cae0da57cb0457f0bc9a8ae64104dcb16c2513cb797a50d3f509db1f6838fc494981ea4e547961e5d7360031720c3452a5ce07a969908409c441c558defb779959f8c51aafc4b2dab5ee12e0cd62c5be7e03fc07e15cba903917d4937bc5ce", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)="0f28cc175d3b381710149e4ceea328f5667368499489bf7ca11d470fa3504bdd03caa928a7d8005467df45003d198af66d955d787979365cb2720e1e131862509125a03b88a44d3018abe8c9b5504129e69f2fd9af1bdd356f40e2346c2f78a7f7ba04587d906c12e1919d0d3611ae8e1313565998") wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc17}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000002ac0)={&(0x7f0000001600), 0x6e, &(0x7f0000002900)=[{&(0x7f0000001680)=""/117, 0x75}, {&(0x7f0000001700)=""/4096, 0x1000}, {&(0x7f0000002700)=""/228, 0xe4}, {&(0x7f0000002800)=""/21, 0x15}, {&(0x7f0000002840)=""/116, 0x74}, {&(0x7f00000028c0)=""/16, 0x10}], 0x6, &(0x7f0000002980)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x138}, 0x40002000) ioctl$EVIOCSKEYCODE_V2(r3, 0x40284504, &(0x7f0000002b00)={0xf9, 0x5, 0x1, 0x101, "fe9ae3ccecc04eb927bbe0e7054f3e4b17d52f743564fa87ea0d097cf689ce93"}) r5 = perf_event_open$cgroup(&(0x7f0000002b40)={0x1, 0x80, 0x20, 0x0, 0xc1, 0x6, 0x0, 0x0, 0x0, 0x6, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0xb, 0x80}, 0x26, 0x0, 0x0, 0x3, 0x400, 0x5, 0xcc, 0x0, 0x1}, r4, 0x6, r1, 0xf) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) getdents64(0xffffffffffffffff, &(0x7f00000001c0)=""/267, 0x10b) r6 = accept4$unix(r0, &(0x7f0000000080)=@abs, &(0x7f0000000140)=0x6e, 0x0) preadv(r6, &(0x7f00000015c0)=[{&(0x7f00000003c0)=""/212, 0xd4}, {&(0x7f00000004c0)=""/208, 0xd0}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x3, 0x101, 0x3) ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000000380)={0x2, 0x7fffffff, 0x7ff}) [ 734.228951][T11920] loop4: detected capacity change from 0 to 224 [ 734.236023][T11922] loop5: detected capacity change from 0 to 224 [ 734.261557][T11900] loop0: detected capacity change from 0 to 1 [ 734.331647][T11900] loop0: p1 p2 p3 p4 [ 734.335745][T11900] loop0: p1 start 10 is beyond EOD, truncated [ 734.341846][T11900] loop0: p2 start 209 is beyond EOD, truncated [ 734.348024][T11900] loop0: p3 start 225 is beyond EOD, truncated [ 734.354580][T11900] loop0: p4 start 2415919104 is beyond EOD, truncated [ 734.366199][T11951] loop4: detected capacity change from 0 to 224 [ 734.373521][T11953] loop5: detected capacity change from 0 to 224 [ 734.399859][ T1039] loop0: p1 p2 p3 p4 [ 734.405149][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 734.411340][ T1039] loop0: p2 start 209 is beyond EOD, truncated [ 734.417574][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 734.423856][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:17 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080ad20000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:17 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000003bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000fffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:17 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) io_cancel(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x3d, r1, &(0x7f0000000080)="01f00cecbef63d6183aabf3138efb08fa7ac9d819823f3c69fb97a37d9a71cee7b2b8cfcbc79645a66a273c09af25211f5493a09bd53a5d27d5735328529f8ec9cd80b1257472e429e", 0x49, 0x20, 0x0, 0x3, r0}, &(0x7f0000000380)) getdents64(r3, &(0x7f00000001c0)=""/267, 0x10b) 07:35:17 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) clone(0xa040000, &(0x7f0000001100)="ab07ad6193fbb2e18100e4c9d6b4a3ce6006f3c901edb3af6920c0c7335e076863ea9ef8e388505eb2d3d09f4acc134f5ee4aad6f14899f5eca13c02ddde49321942ce308a1b4ae47d591c4c2dfe228b6f5915b39d99109f3626a18486b889c81f3546cae0da57cb0457f0bc9a8ae64104dcb16c2513cb797a50d3f509db1f6838fc494981ea4e547961e5d7360031720c3452a5ce07a969908409c441c558defb779959f8c51aafc4b2dab5ee12e0cd62c5be7e03fc07e15cba903917d4937bc5ce", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)="0f28cc175d3b381710149e4ceea328f5667368499489bf7ca11d470fa3504bdd03caa928a7d8005467df45003d198af66d955d787979365cb2720e1e131862509125a03b88a44d3018abe8c9b5504129e69f2fd9af1bdd356f40e2346c2f78a7f7ba04587d906c12e1919d0d3611ae8e1313565998") preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 734.477708][ T1039] loop0: p1 p2 p3 p4 [ 734.487283][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 734.493459][ T1039] loop0: p2 start 209 is beyond EOD, truncated [ 734.499642][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 734.500884][T11971] loop4: detected capacity change from 0 to 224 [ 734.505911][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated [ 734.507629][T11970] loop5: detected capacity change from 0 to 224 07:35:17 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000204bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000feffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 734.589467][T11978] loop0: detected capacity change from 0 to 1 [ 734.617873][T11990] loop5: detected capacity change from 0 to 224 [ 734.619557][T11978] loop0: p1 p2 p3 p4 [ 734.624915][T11991] loop4: detected capacity change from 0 to 224 [ 734.628276][T11978] loop0: p1 start 10 is beyond EOD, truncated [ 734.640581][T11978] loop0: p2 start 210 is beyond EOD, truncated [ 734.646725][T11978] loop0: p3 start 225 is beyond EOD, truncated [ 734.646742][T11978] loop0: p4 start 2415919104 is beyond EOD, truncated [ 734.702039][T11978] loop0: detected capacity change from 0 to 1 [ 734.739690][T11978] loop0: p1 p2 p3 p4 [ 734.743901][T11978] loop0: p1 start 10 is beyond EOD, truncated [ 734.750008][T11978] loop0: p2 start 210 is beyond EOD, truncated [ 734.756293][T11978] loop0: p3 start 225 is beyond EOD, truncated [ 734.762579][T11978] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:18 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x10000, 0x8) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x8, 0x0) openat(r2, &(0x7f0000000080)='./file0\x00', 0x12d002, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r3, &(0x7f00000001c0)=""/267, 0x10b) 07:35:18 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:18 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000604bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:18 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) clone(0xa040000, &(0x7f0000001100)="ab07ad6193fbb2e18100e4c9d6b4a3ce6006f3c901edb3af6920c0c7335e076863ea9ef8e388505eb2d3d09f4acc134f5ee4aad6f14899f5eca13c02ddde49321942ce308a1b4ae47d591c4c2dfe228b6f5915b39d99109f3626a18486b889c81f3546cae0da57cb0457f0bc9a8ae64104dcb16c2513cb797a50d3f509db1f6838fc494981ea4e547961e5d7360031720c3452a5ce07a969908409c441c558defb779959f8c51aafc4b2dab5ee12e0cd62c5be7e03fc07e15cba903917d4937bc5ce", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)="0f28cc175d3b381710149e4ceea328f5667368499489bf7ca11d470fa3504bdd03caa928a7d8005467df45003d198af66d955d787979365cb2720e1e131862509125a03b88a44d3018abe8c9b5504129e69f2fd9af1bdd356f40e2346c2f78a7f7ba04587d906c12e1919d0d3611ae8e1313565998") preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:18 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000002bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:18 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080ad30000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:18 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000005bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:18 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000003bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 735.087047][T12015] loop5: detected capacity change from 0 to 224 [ 735.096171][T12021] loop0: detected capacity change from 0 to 1 [ 735.097068][T12018] loop4: detected capacity change from 0 to 224 07:35:18 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) clone(0xa040000, &(0x7f0000001100)="ab07ad6193fbb2e18100e4c9d6b4a3ce6006f3c901edb3af6920c0c7335e076863ea9ef8e388505eb2d3d09f4acc134f5ee4aad6f14899f5eca13c02ddde49321942ce308a1b4ae47d591c4c2dfe228b6f5915b39d99109f3626a18486b889c81f3546cae0da57cb0457f0bc9a8ae64104dcb16c2513cb797a50d3f509db1f6838fc494981ea4e547961e5d7360031720c3452a5ce07a969908409c441c558defb779959f8c51aafc4b2dab5ee12e0cd62c5be7e03fc07e15cba903917d4937bc5ce", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)="0f28cc175d3b381710149e4ceea328f5667368499489bf7ca11d470fa3504bdd03caa928a7d8005467df45003d198af66d955d787979365cb2720e1e131862509125a03b88a44d3018abe8c9b5504129e69f2fd9af1bdd356f40e2346c2f78a7f7ba04587d906c12e1919d0d3611ae8e1313565998") preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 735.180147][T12021] loop0: p1 p2 p3 p4 [ 735.184450][T12021] loop0: p1 start 10 is beyond EOD, truncated [ 735.190579][T12021] loop0: p2 start 211 is beyond EOD, truncated [ 735.196735][T12021] loop0: p3 start 225 is beyond EOD, truncated [ 735.202941][T12044] loop5: detected capacity change from 0 to 224 [ 735.203005][T12021] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:18 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000006bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:18 executing program 3: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:18 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000004bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 735.230848][T12051] loop4: detected capacity change from 0 to 224 [ 735.267660][T12021] loop0: detected capacity change from 0 to 1 [ 735.296220][T12021] loop0: p1 p2 p3 p4 [ 735.300409][T12021] loop0: p1 start 10 is beyond EOD, truncated [ 735.306471][T12021] loop0: p2 start 211 is beyond EOD, truncated [ 735.312761][T12021] loop0: p3 start 225 is beyond EOD, truncated [ 735.319002][T12021] loop0: p4 start 2415919104 is beyond EOD, truncated [ 735.335698][T12065] loop4: detected capacity change from 0 to 224 07:35:18 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 735.338835][T12070] loop5: detected capacity change from 0 to 224 07:35:18 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:18 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000406bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:18 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000005bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:18 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000803da0000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:18 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:18 executing program 3: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:18 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000007bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:18 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000006bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 735.960980][T12087] loop5: detected capacity change from 0 to 224 [ 735.985131][T12094] loop0: detected capacity change from 0 to 1 [ 735.988210][T12095] loop4: detected capacity change from 0 to 224 07:35:19 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000009bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:19 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 736.019573][T12094] loop0: p1 p2 p3 p4 [ 736.023680][T12094] loop0: p1 start 10 is beyond EOD, truncated [ 736.029793][T12094] loop0: p2 start 218 is beyond EOD, truncated [ 736.035957][T12094] loop0: p3 start 225 is beyond EOD, truncated [ 736.039782][T12109] loop5: detected capacity change from 0 to 224 [ 736.042302][T12094] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:19 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000abf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 736.097017][T12094] loop0: detected capacity change from 0 to 1 [ 736.107575][T12123] loop4: detected capacity change from 0 to 224 [ 736.108956][T12127] loop5: detected capacity change from 0 to 224 07:35:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000007bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 736.139710][T12094] loop0: p1 p2 p3 p4 [ 736.153678][T12094] loop0: p1 start 10 is beyond EOD, truncated [ 736.159976][T12094] loop0: p2 start 218 is beyond EOD, truncated [ 736.166301][T12094] loop0: p3 start 225 is beyond EOD, truncated [ 736.172512][T12094] loop0: p4 start 2415919104 is beyond EOD, truncated [ 736.196576][T12140] loop5: detected capacity change from 0 to 224 [ 736.218605][T12144] loop4: detected capacity change from 0 to 224 [ 736.231667][ T1039] loop0: p1 p2 p3 p4 [ 736.235877][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 736.242065][ T1039] loop0: p2 start 218 is beyond EOD, truncated [ 736.248214][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 736.254481][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:19 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, 0x0, 0x0) 07:35:19 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:19 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000bbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:19 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000804f50000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000008bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:19 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r1 = eventfd(0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) read$usbmon(r2, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r2, &(0x7f0000000100)={0xfffffffffffffccc}, 0x9) 07:35:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000009bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:19 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:19 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 736.864198][T12163] loop4: detected capacity change from 0 to 224 [ 736.890232][T12175] loop5: detected capacity change from 0 to 224 [ 736.897032][T12173] loop0: detected capacity change from 0 to 1 07:35:19 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000dbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 736.945432][T12173] loop0: p1 p2 p3 p4 [ 736.952781][T12173] loop0: p1 start 10 is beyond EOD, truncated [ 736.958929][T12173] loop0: p2 start 245 is beyond EOD, truncated [ 736.965712][T12173] loop0: p3 start 225 is beyond EOD, truncated [ 736.972008][T12173] loop0: p4 start 2415919104 is beyond EOD, truncated [ 736.975426][T12194] loop5: detected capacity change from 0 to 224 [ 736.998059][T12198] loop4: detected capacity change from 0 to 224 [ 737.035606][T12204] loop5: detected capacity change from 0 to 224 07:35:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000abf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:20 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 737.051495][T12173] loop0: detected capacity change from 0 to 1 [ 737.089652][T12210] loop4: detected capacity change from 0 to 224 [ 737.109844][ T1039] loop0: p1 p2 p3 p4 [ 737.114065][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 737.120169][ T1039] loop0: p2 start 245 is beyond EOD, truncated [ 737.126607][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 737.132818][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated [ 737.140269][T12173] loop0: p1 p2 p3 p4 [ 737.144592][T12173] loop0: p1 start 10 is beyond EOD, truncated [ 737.150723][T12173] loop0: p2 start 245 is beyond EOD, truncated [ 737.157016][T12173] loop0: p3 start 225 is beyond EOD, truncated [ 737.163217][T12173] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:20 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, 0x0, 0x0) 07:35:20 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000ebf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:20 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000bbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:20 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008fffe0000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:20 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) clone(0x0, &(0x7f0000000300)="050a08035e9c6e84a7fa1f8501eb580553fac62f43919cc89a35ba3bbe287412fd78ca0d91fba909e13846219490f646ad6f90ea7a062359ecb1e8e5ec08eebb988b3489e17e914a68252f8d5cfab62e8e8c2a019ebfdd572d7e85a5a340b3ff98fbea5970e6ee72468dd46dd1f726ea62fb9d529ccd5498c7d7099a7e0f6ca7a23d3de7d4cb3a6087f3daba46cfb75601f546c5fb3ae848aff3330b152b066273b0076748a2099d791998a95e0e01ec1f55ad2b897dd57c17c767826e807fc0c91b556f9905", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000006c0)="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") wait4(0x0, 0x0, 0x1, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x18) 07:35:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:20 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000fbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 737.749572][T12244] loop5: detected capacity change from 0 to 224 [ 737.760583][T12245] loop4: detected capacity change from 0 to 224 [ 737.766542][T12249] loop0: detected capacity change from 0 to 1 07:35:20 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000dbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 737.838055][T12269] loop4: detected capacity change from 0 to 224 [ 737.842853][T12263] loop5: detected capacity change from 0 to 224 [ 737.856711][T12249] loop0: p1 p2 p3 p4 [ 737.865565][T12249] loop0: p1 start 10 is beyond EOD, truncated [ 737.871697][T12249] loop0: p2 start 254 is beyond EOD, truncated [ 737.877946][T12249] loop0: p3 start 225 is beyond EOD, truncated 07:35:20 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000002010bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 737.884357][T12249] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:20 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000011bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 737.934131][T12283] loop4: detected capacity change from 0 to 224 [ 737.964476][T12291] loop5: detected capacity change from 0 to 224 [ 737.981583][T12249] loop0: detected capacity change from 0 to 1 [ 738.039746][T12298] loop5: detected capacity change from 0 to 224 [ 738.044645][ T1039] loop0: p1 p2 p3 p4 [ 738.050494][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 738.056619][ T1039] loop0: p2 start 254 is beyond EOD, truncated [ 738.062896][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 738.069125][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated [ 738.076942][T12249] loop0: p1 p2 p3 p4 [ 738.081054][T12249] loop0: p1 start 10 is beyond EOD, truncated [ 738.087115][T12249] loop0: p2 start 254 is beyond EOD, truncated [ 738.093279][T12249] loop0: p3 start 225 is beyond EOD, truncated [ 738.099571][T12249] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:21 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r2 = eventfd(0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) read$usbmon(r3, &(0x7f0000000240)=""/232, 0xe8) write$P9_RWALK(r3, 0x0, 0x0) 07:35:21 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000ebf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:21 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:21 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000012bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:21 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080fff0000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:21 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) clone(0x0, &(0x7f0000000300)="050a08035e9c6e84a7fa1f8501eb580553fac62f43919cc89a35ba3bbe287412fd78ca0d91fba909e13846219490f646ad6f90ea7a062359ecb1e8e5ec08eebb988b3489e17e914a68252f8d5cfab62e8e8c2a019ebfdd572d7e85a5a340b3ff98fbea5970e6ee72468dd46dd1f726ea62fb9d529ccd5498c7d7099a7e0f6ca7a23d3de7d4cb3a6087f3daba46cfb75601f546c5fb3ae848aff3330b152b066273b0076748a2099d791998a95e0e01ec1f55ad2b897dd57c17c767826e807fc0c91b556f9905", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000006c0)="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") wait4(0x0, 0x0, 0x1, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x18) 07:35:21 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000fbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 738.634657][T12320] loop4: detected capacity change from 0 to 224 [ 738.641339][T12322] loop0: detected capacity change from 0 to 1 [ 738.643640][T12323] loop5: detected capacity change from 0 to 224 07:35:21 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 738.689466][T12322] loop0: p1 p2 p3 p4 [ 738.693774][T12322] loop0: p1 start 10 is beyond EOD, truncated [ 738.699941][T12322] loop0: p2 start 255 is beyond EOD, truncated [ 738.706082][T12322] loop0: p3 start 225 is beyond EOD, truncated [ 738.706101][T12322] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:21 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000018bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:21 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000010bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:21 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 738.759668][T12348] loop4: detected capacity change from 0 to 224 [ 738.783706][T12322] loop0: detected capacity change from 0 to 1 07:35:21 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000019bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 738.813816][T12363] loop5: detected capacity change from 0 to 224 [ 738.831453][T12322] loop0: p1 p2 p3 p4 [ 738.835601][T12322] loop0: p1 start 10 is beyond EOD, truncated [ 738.841726][T12322] loop0: p2 start 255 is beyond EOD, truncated [ 738.847903][T12322] loop0: p3 start 225 is beyond EOD, truncated [ 738.854074][T12322] loop0: p4 start 2415919104 is beyond EOD, truncated [ 738.879419][T12376] loop4: detected capacity change from 0 to 224 [ 738.884124][T12375] loop5: detected capacity change from 0 to 224 [ 738.894672][ T1039] loop0: p1 p2 p3 p4 [ 738.904554][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 738.910688][ T1039] loop0: p2 start 255 is beyond EOD, truncated [ 738.917005][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 738.923192][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:22 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) clone(0x0, &(0x7f0000000300)="050a08035e9c6e84a7fa1f8501eb580553fac62f43919cc89a35ba3bbe287412fd78ca0d91fba909e13846219490f646ad6f90ea7a062359ecb1e8e5ec08eebb988b3489e17e914a68252f8d5cfab62e8e8c2a019ebfdd572d7e85a5a340b3ff98fbea5970e6ee72468dd46dd1f726ea62fb9d529ccd5498c7d7099a7e0f6ca7a23d3de7d4cb3a6087f3daba46cfb75601f546c5fb3ae848aff3330b152b066273b0076748a2099d791998a95e0e01ec1f55ad2b897dd57c17c767826e807fc0c91b556f9905", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000006c0)="3e6d6e61afdad67b6cb54f60f7de80e57170e47ed953aa91cd8d13b6e11737fc84d53e479864ebd3cf34f57374c4c5f6bb6085d2ccef6e811f87f26fde94b3add4f2e75c9bffcfc96577b0ad6c4d51d58239600367370c30eb757f3df267887a4d093ad5ab5a10166cbc96016c1db259276047ad27362fb62c9c8776c34e20843788a14c3c35a4a285a6045e8254ed12b20c1e22018145a9a012b6e5e2cef9e099f788cfa66a3c21e9c471447abf1b5b9cb647f64b11e272c9b87e944d61ecae4fdebf910d51b39280981653b7c634a94ad3ae0e8a6521313b34eece2adfca1947e0fa76a44f0677071411023ba6e5dcb343c0c98398f299dfc44544e785878df99fa409e2f3e9cda3d5417d237db8a20b4bc08f62acb080ce2b4279fc1d6b0551ef20fbc1be1dc335a94b7097c06c00f331463daf893d414306a7f73c18d9cfbb14c71d5661753afd0a50a6394a4d32bf90ab4ee009190189bcba774ae11934ffbe13b78c6f5b0413af93b335a8628deba9b4c551716a48242f2ecc4bcfd4c313def108fe781eff7b88df891d47e64b6e512b6851463ea701221489057d7473149d642375fb4874ec32ae7f801889359ec16c9bcc1e344ab2e46d7b25b3063def2cac8da4bba1cdedd0dcd780fe49d19a57cc7b2999853d74ff2961bcdcf5c2054489dc9d169022cffb1245fca8646fbd8894f90f9f395fe7ee028449c87b52aeab6aaa2c7e364435ac19dd0bbe8f210c080b4bac2031d1a26f10a104165873e9da02179157f3767b08148a28f051771a7cf5836f72c5840cd7b3e8eab059165e0232335d053668cac0db230f047f5b3d3b9488e671b7e4d4031e32c6ed048ba02ef15a29b78485b7d91db156cac78aa5e33ced0b37012991266574cb6ca4e76329f14c293d443a7c1aa3a29011c58f2498b0bef76dfa3e876ef8bd1ed1f4bb3e55adc7672010a31eb1d081d65752f7ad75a1cb5b822c33ea6c6fa1e70992d63fd99717f5dc35a10648e6da98d70d2e9e37dad4c4d372ce697546a026a08280593ca309b0ce3c0be3795dacb5aaefa8cf23668b5ee2bf303586e1f514f689fd6745573a644cc1232459327d4465241709f5a1b6bc0ff1fffdb440663ff76dde00cb9a199c5fb3b169b8c2c76739c0a24697e88c7db2882faa69d73e6af20a985714f399d275e9cd981edaee8ecf8d0d5a1fcbb5cb4f9e162d1004c3a9969279fae145777bd03e5bba168041b07e900fd661be5307da3752b1f9521acfc1cf197ac5dffeac28fb37d3dd97fd35376c9718aa67a0d6667e88402412dfba6ae081a4ebb5061f6ca8f748d81431086b04b34be9a38ed080229a5fd8281a63f08c52b5c02c2d3bb6863fe37e20a4494a967e80f39ee8895f2559d1341532a96d9a200c8f3fd94de2d3ee5648ff64e70cecf0d285a5f550ee753d2ef80363292a1e03463347dc86a657ac62e305620d9e2b27bfd4e023599996740891d557314aa21444b58345715ddcdfd0da8cc16588c80836cc47c4b3229d27b193197fa45dfcc5e6d07486a20dd4572abdafd3e7cf62c720eb0e02390cd5d1bb9ba224b70a223bb8c4c9f8340194d4c247ed108238b89e82062df197ada1e0cacab7855808f279ead9784faafa50b35bc6847a0a2139ea966f484f7172ad070f86c581ae8f4ecb9a4bddc4a60ccf49481c4821e43ac51dbc39739c77d7517dfb660adb1f0df6a4e23c44cc455406da747d8a7ee52b7b3135f2ae38653ce0186649f3eb11ed31faa77240c725ce9aa27474d6a6436ffdbeb9bc4d364747215a5c4f061d36dbc72a46804c0c16609293effe79d9ba7c21cb78e7ffa25eb3da4218d284ed6ba0746a0056ecd5008e3b9cbdee6c6e2e3e78404b1f8a4718e32b4554177ab261e8092245dad6f792ef2d80a10e3fcf299306cbe94d5bd268623e09de0cb2c4c970cdca0c7726724efb2ffa2bed18e689dc222b31597b85072601928903ae2c07ef17b96a1c20c9514a5e0b998d911fbe18ab3811d365f5013329fb1d3204ef6d14b991ff89091bc45a3f4525e97554513c9ca8ea6500a9144523fd594de0f1b876b4c0ff02b1ef6db6320b937ca8ba5ab01dcd05a0904ba67da7b8d3c6975a40b544f5f715f15b616074b3f5fd4728237e8549a40f13162ea456dac78654911023f0a2aa6fc36da3ef3f693271800f883a8f1313ea0e1c8d38fbf16c1718ddca46ced68ca5153b59e5f2bdc03876ce37021ef55e9e3e753526e80cd1d22116dbc95f85d08af9d72aebd1828e537b61bf4dd9dca7ead026e6072d5c78a47169f947964cff3029e279c00ea1ede46ebf63f5988c9eed9a7f0be56f378b00454a312bf067e1b49fede3e406d26c15c513b5cff84d86b1e1d3ebef720f9eb30c357dbade920985590803d68b54b8cd06ecbecfdbd97c0d8c42279a2cfbe0c80e2c5f7377546db45e35aba919e645475d622a701536c72cf4489c0e97fdd54b0100c34c2907a67eef3b46f730027e5841a17b7a9fdb64406462cd0e68833abb7ff5b871491f9482d4b923feed9ff70fa739ccd641addc1d0c3a45f56c3acf3d4ca01c7fde715057b6547194126f6ff796fd09457704c93ade7b7839fd5907b32388bb68fcc6679e666344cfc85c81a8796485d98819411ec1401e4b462ed19471b23d87771f5cf3f7e687799b1c5af27e2ce51a130f34fed288955302267372d1d960d85f98e28ac39b0d46812c26f86e7389a96c3b866bfcb8d00f295ae9e7c826fcbff23d285ca973c3196f131edd8236c88485c7df6457c26a42e069606a91d05d8c99e851a37fdb3e569457e8f9af9708819fa8aee83a665cac3ba3e9f373655242298052e7f64693fb19308a676abf196e843bdb0c74f06e6ff24e348347aeb6350b9e646d5b29bc0d548d6daf10d03254193485952be9fe46fb46edd7015fb0809741b08d0c79f1770100b678f8a650394ce412e0a35dd1184de6360651d7b24e3a6f19ba953fdbecedf3564edc460641b1a0d57ab594079baa8fe3d63a8988757b3288058b652f5eb5799f52a3f9eccd9a8b096a10851f826a083472d04872b4f19fb4493a2b6d8811c25fea4008db7ecdbd372100f9c1f65353ff470e4a3de82e3dc67f4327a4a292b8ae65498774d59b9927f882907bf075e8b78f467c7e5fd184f70947d08278e4cd4dce2af4c5f51838d5ec228bc0ad8e20572e43e0c3f9e8805d4dd61e4a627fa8b8af0729344a8faf3134bbe235060ab7e3969ce87af8008dc0341477c7fac4aa1b3b70067e920f88abf1b082c3e90834567bdc6f44a9a986e8e4cbd692182c418d4b3a2bd0c5b75e6ea5d5a9878874d74bb779bbf27a40f362011ce954021acb3f78a7cc5252299faf7d1d634d437027afd54494b750614622aa33d893f53ba29f8a0f0660ca23574f9440d05a9c9885b7ecf2bf79cb3feae3c0bf811a32f2d9ffca70d98deab8bbda92c4b2646be118758273fc70d845345c9e8544c98952d5fb78ac9323c502705b88c06272ead0644c2017870fecf4f78d1fde0909170cd0db35bb2c97916f0583c991dd24859f573f1fa88acc248efbc2988730d242dab519c6a1cc8a2f356fec5905a62d74bd688f80d503e82787b80bdba77efca519299566cc656d00bfdff218f77ebaa7632414ad0bcd92177a602b2bcceed95840f12e0512e5f0e352586f234a2783cdbb163401b08c6dfa460a4565eb69a4a1b9ff3eb677922977b51bffd6f28b5846504f4f86265e015df18d0d0aa7da70a2d1ddd6bfa676e8d184e7db4e93321f8f3c287aa0eabf87f70cd3e45c0e31485c9c4ffdaf9342f9c6af51cb861e9099671829e050a22327c759d2766fd2a09f515e386651c9793d22781baf11328de0731936ab350235099ff78a75e6edefc0276470b6f01a0354a977fe629da4fe8b74204042ac7e2ee08931234fbef5ff653647fe42802784099ae2c61cc39249262595dafc2711dfb5b96dfbef3080aa49c02c6ccdd80849d884c1afb08e6c236e728dd1b8dbe34bc53e85b6e93ae979f79e75b1f33ea1d0c3aa50504d4db78c9c6779981f71e6d5ded864afa545419489027574c53c2be5d6fdaa783e0047216faf599d95db9ff28a29057650134eb9851df16b8abf8da4f011e59d7fbe8c6bc379d62858b32eea1f92586dcba624254a4bd0ca74b4ccba853e567a78ba0595b9bd33e807766a86bd39b91253e86f7293b43357a1881df4755067084f93d320e40f790d0eaae681c99f689bc5e3eac5821b16b8c0ba3c63ff2df6471fb5b7488c59ad1b5da9b093ce94945abe211fbe307e4e1f0bb3850b1998440bb614715a6a474ebd81b57c985c4fcf3e64a1075bd279fa9152a9bb34a4b82ac883af92f3941a24788ce5601736cd7b4ecf8f97753b7a42690774077adc344309807a170efe96f6b5d09cc96ef551a613e9d47e89cf771c925ec13e700513485009abec6f08476b05f59b40140c5eb6b653e67f44c689d8ee0362400cf24a08f88f47920961e9420518968c1fbc6a7110c84bac66c3036a042d6b981ece72eac89015cea8f3066205cb24413ab5cb489bdf6424a93773bc719e7f0993fe7255b8e84573c8b9e30382dec7e61f5266de7413f76d43c2b5ec50ccb420ce524e8744e958150954be439059ab7ac45a0b00dba42de700a429a9aacaf0eca9597ee560e0dcb1b92549a82e70aed6add3726aba7b89b410acc980b50f4a2fbabbd56a7e4f972fe7cfecafa5c755dec5d39c429faf719e531bf98ada69a6e8b4c1adcbddec738d23ea5bbb851585a3e8030d5892c776797d4446953935f820d309d717c2d67b1da4ae645119b970a0f42a730f37818a55362f34b339defde51998ce0e6744c009edb6545b91cae7ad064a7801f13278c189a7d69a3544ba664fca0cbbbe5e7fd849cd3d9b8a76144177f73221900ed2aa57ab687a2741f70a18385f43869c278593599010524c3e7194bc03e8a6cc37fff9e5aa4f8e416b6cd63037035d32a06230bc98de4503fb9f4061aabb52ea0e7e60542589b84525660002b0867996a9c3a1bdd711b0203476a9e312903848504f456d59a149b68ea34cfe3a7bba4d4ea9991f25d68e60f5cbf85923702f623a5db203e5a5706003b8ddf2cae3625567b92badc814e783193ab74855088aff0b32bda2397ac6389b91bc8148180fa738d0e4c4930416eeb1917d22d8157c64ded6f01da9f6a3c375a445ac543b93e6137dea5053ad3f1e3e151be6131cddf6db364568f9bd6206d2618a3a8d81816c4a87c0209e8b6bd20e295ca1701fa493dc09a7c0eacffa4cb585478a3f832a3bfa41b29f166e6fc2810b1776ee15976d1b6c4b1d317e13b48d4a64dec5fc77ee5e4060e227b06725ce8b2941a248cca9df062633279d0bb19c196db24b734b68b8b67167b72a54dd865f1bcc4b4c65ddbb53fb147949b02f29c8741b38cb797ebc18092871db7f119daef5b3ddaf8eb1bb916b4e0c75a34381c41e46e0675a887843b2704776fe1bdbc713e9f2a687903c675e545672dfd86fc293362eb6e967b1c458074a67eb740f48642eeb0293985b497cad454813611e6b4c528c57651394c5a5ddcd4ebdf8a13a78e2eff4ea04856799e3da2d16e607f2d6c9b2f1085184fe20a0237ed2e8a9ba6598932049f7e6c7cc07b5d7c163f2e13233b933f620b181b70c1104896aeda9afba997704b5913170e7524f4c6da79aa3e585555a577609239f78c348fa629394dcdfb72ef0afe7e8377c5df5228b1e5536fc61a64c8129d363cfb21420f213119fd4db81") wait4(0x0, 0x0, 0x1, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x18) 07:35:22 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:22 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008feff0000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000011bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:22 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000001020bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:22 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:22 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000022bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000012bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 739.527568][T12397] loop5: detected capacity change from 0 to 224 [ 739.542123][T12403] loop0: detected capacity change from 0 to 1 [ 739.552297][T12404] loop4: detected capacity change from 0 to 224 07:35:22 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x40010, r0, 0xfcb32000) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:22 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000025bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 739.609409][T12403] loop0: p1 p2 p3 p4 [ 739.613492][T12403] loop0: p1 start 10 is beyond EOD, truncated [ 739.619587][T12403] loop0: p2 start 255 is beyond EOD, truncated [ 739.625105][T12415] loop5: detected capacity change from 0 to 224 [ 739.625735][T12403] loop0: p3 start 225 is beyond EOD, truncated [ 739.625750][T12403] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:22 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:22 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000003fbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 739.705674][T12425] loop4: detected capacity change from 0 to 224 [ 739.730386][T12403] loop0: detected capacity change from 0 to 1 [ 739.740603][T12436] loop5: detected capacity change from 0 to 224 [ 739.759860][T12403] loop0: p1 p2 p3 p4 [ 739.764810][T12403] loop0: p1 start 10 is beyond EOD, truncated [ 739.770928][T12403] loop0: p2 start 255 is beyond EOD, truncated [ 739.777787][T12403] loop0: p3 start 225 is beyond EOD, truncated [ 739.783983][T12403] loop0: p4 start 2415919104 is beyond EOD, truncated [ 739.843923][T12450] loop5: detected capacity change from 0 to 224 07:35:23 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) clone(0x0, &(0x7f0000000300)="050a08035e9c6e84a7fa1f8501eb580553fac62f43919cc89a35ba3bbe287412fd78ca0d91fba909e13846219490f646ad6f90ea7a062359ecb1e8e5ec08eebb988b3489e17e914a68252f8d5cfab62e8e8c2a019ebfdd572d7e85a5a340b3ff98fbea5970e6ee72468dd46dd1f726ea62fb9d529ccd5498c7d7099a7e0f6ca7a23d3de7d4cb3a6087f3daba46cfb75601f546c5fb3ae848aff3330b152b066273b0076748a2099d791998a95e0e01ec1f55ad2b897dd57c17c767826e807fc0c91b556f9905", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000006c0)="3e6d6e61afdad67b6cb54f60f7de80e57170e47ed953aa91cd8d13b6e11737fc84d53e479864ebd3cf34f57374c4c5f6bb6085d2ccef6e811f87f26fde94b3add4f2e75c9bffcfc96577b0ad6c4d51d58239600367370c30eb757f3df267887a4d093ad5ab5a10166cbc96016c1db259276047ad27362fb62c9c8776c34e20843788a14c3c35a4a285a6045e8254ed12b20c1e22018145a9a012b6e5e2cef9e099f788cfa66a3c21e9c471447abf1b5b9cb647f64b11e272c9b87e944d61ecae4fdebf910d51b39280981653b7c634a94ad3ae0e8a6521313b34eece2adfca1947e0fa76a44f0677071411023ba6e5dcb343c0c98398f299dfc44544e785878df99fa409e2f3e9cda3d5417d237db8a20b4bc08f62acb080ce2b4279fc1d6b0551ef20fbc1be1dc335a94b7097c06c00f331463daf893d414306a7f73c18d9cfbb14c71d5661753afd0a50a6394a4d32bf90ab4ee009190189bcba774ae11934ffbe13b78c6f5b0413af93b335a8628deba9b4c551716a48242f2ecc4bcfd4c313def108fe781eff7b88df891d47e64b6e512b6851463ea701221489057d7473149d642375fb4874ec32ae7f801889359ec16c9bcc1e344ab2e46d7b25b3063def2cac8da4bba1cdedd0dcd780fe49d19a57cc7b2999853d74ff2961bcdcf5c2054489dc9d169022cffb1245fca8646fbd8894f90f9f395fe7ee028449c87b52aeab6aaa2c7e364435ac19dd0bbe8f210c080b4bac2031d1a26f10a104165873e9da02179157f3767b08148a28f051771a7cf5836f72c5840cd7b3e8eab059165e0232335d053668cac0db230f047f5b3d3b9488e671b7e4d4031e32c6ed048ba02ef15a29b78485b7d91db156cac78aa5e33ced0b37012991266574cb6ca4e76329f14c293d443a7c1aa3a29011c58f2498b0bef76dfa3e876ef8bd1ed1f4bb3e55adc7672010a31eb1d081d65752f7ad75a1cb5b822c33ea6c6fa1e70992d63fd99717f5dc35a10648e6da98d70d2e9e37dad4c4d372ce697546a026a08280593ca309b0ce3c0be3795dacb5aaefa8cf23668b5ee2bf303586e1f514f689fd6745573a644cc1232459327d4465241709f5a1b6bc0ff1fffdb440663ff76dde00cb9a199c5fb3b169b8c2c76739c0a24697e88c7db2882faa69d73e6af20a985714f399d275e9cd981edaee8ecf8d0d5a1fcbb5cb4f9e162d1004c3a9969279fae145777bd03e5bba168041b07e900fd661be5307da3752b1f9521acfc1cf197ac5dffeac28fb37d3dd97fd35376c9718aa67a0d6667e88402412dfba6ae081a4ebb5061f6ca8f748d81431086b04b34be9a38ed080229a5fd8281a63f08c52b5c02c2d3bb6863fe37e20a4494a967e80f39ee8895f2559d1341532a96d9a200c8f3fd94de2d3ee5648ff64e70cecf0d285a5f550ee753d2ef80363292a1e03463347dc86a657ac62e305620d9e2b27bfd4e023599996740891d557314aa21444b58345715ddcdfd0da8cc16588c80836cc47c4b3229d27b193197fa45dfcc5e6d07486a20dd4572abdafd3e7cf62c720eb0e02390cd5d1bb9ba224b70a223bb8c4c9f8340194d4c247ed108238b89e82062df197ada1e0cacab7855808f279ead9784faafa50b35bc6847a0a2139ea966f484f7172ad070f86c581ae8f4ecb9a4bddc4a60ccf49481c4821e43ac51dbc39739c77d7517dfb660adb1f0df6a4e23c44cc455406da747d8a7ee52b7b3135f2ae38653ce0186649f3eb11ed31faa77240c725ce9aa27474d6a6436ffdbeb9bc4d364747215a5c4f061d36dbc72a46804c0c16609293effe79d9ba7c21cb78e7ffa25eb3da4218d284ed6ba0746a0056ecd5008e3b9cbdee6c6e2e3e78404b1f8a4718e32b4554177ab261e8092245dad6f792ef2d80a10e3fcf299306cbe94d5bd268623e09de0cb2c4c970cdca0c7726724efb2ffa2bed18e689dc222b31597b85072601928903ae2c07ef17b96a1c20c9514a5e0b998d911fbe18ab3811d365f5013329fb1d3204ef6d14b991ff89091bc45a3f4525e97554513c9ca8ea6500a9144523fd594de0f1b876b4c0ff02b1ef6db6320b937ca8ba5ab01dcd05a0904ba67da7b8d3c6975a40b544f5f715f15b616074b3f5fd4728237e8549a40f13162ea456dac78654911023f0a2aa6fc36da3ef3f693271800f883a8f1313ea0e1c8d38fbf16c1718ddca46ced68ca5153b59e5f2bdc03876ce37021ef55e9e3e753526e80cd1d22116dbc95f85d08af9d72aebd1828e537b61bf4dd9dca7ead026e6072d5c78a47169f947964cff3029e279c00ea1ede46ebf63f5988c9eed9a7f0be56f378b00454a312bf067e1b49fede3e406d26c15c513b5cff84d86b1e1d3ebef720f9eb30c357dbade920985590803d68b54b8cd06ecbecfdbd97c0d8c42279a2cfbe0c80e2c5f7377546db45e35aba919e645475d622a701536c72cf4489c0e97fdd54b0100c34c2907a67eef3b46f730027e5841a17b7a9fdb64406462cd0e68833abb7ff5b871491f9482d4b923feed9ff70fa739ccd641addc1d0c3a45f56c3acf3d4ca01c7fde715057b6547194126f6ff796fd09457704c93ade7b7839fd5907b32388bb68fcc6679e666344cfc85c81a8796485d98819411ec1401e4b462ed19471b23d87771f5cf3f7e687799b1c5af27e2ce51a130f34fed288955302267372d1d960d85f98e28ac39b0d46812c26f86e7389a96c3b866bfcb8d00f295ae9e7c826fcbff23d285ca973c3196f131edd8236c88485c7df6457c26a42e069606a91d05d8c99e851a37fdb3e569457e8f9af9708819fa8aee83a665cac3ba3e9f373655242298052e7f64693fb19308a676abf196e843bdb0c74f06e6ff24e348347aeb6350b9e646d5b29bc0d548d6daf10d03254193485952be9fe46fb46edd7015fb0809741b08d0c79f1770100b678f8a650394ce412e0a35dd1184de6360651d7b24e3a6f19ba953fdbecedf3564edc460641b1a0d57ab594079baa8fe3d63a8988757b3288058b652f5eb5799f52a3f9eccd9a8b096a10851f826a083472d04872b4f19fb4493a2b6d8811c25fea4008db7ecdbd372100f9c1f65353ff470e4a3de82e3dc67f4327a4a292b8ae65498774d59b9927f882907bf075e8b78f467c7e5fd184f70947d08278e4cd4dce2af4c5f51838d5ec228bc0ad8e20572e43e0c3f9e8805d4dd61e4a627fa8b8af0729344a8faf3134bbe235060ab7e3969ce87af8008dc0341477c7fac4aa1b3b70067e920f88abf1b082c3e90834567bdc6f44a9a986e8e4cbd692182c418d4b3a2bd0c5b75e6ea5d5a9878874d74bb779bbf27a40f362011ce954021acb3f78a7cc5252299faf7d1d634d437027afd54494b750614622aa33d893f53ba29f8a0f0660ca23574f9440d05a9c9885b7ecf2bf79cb3feae3c0bf811a32f2d9ffca70d98deab8bbda92c4b2646be118758273fc70d845345c9e8544c98952d5fb78ac9323c502705b88c06272ead0644c2017870fecf4f78d1fde0909170cd0db35bb2c97916f0583c991dd24859f573f1fa88acc248efbc2988730d242dab519c6a1cc8a2f356fec5905a62d74bd688f80d503e82787b80bdba77efca519299566cc656d00bfdff218f77ebaa7632414ad0bcd92177a602b2bcceed95840f12e0512e5f0e352586f234a2783cdbb163401b08c6dfa460a4565eb69a4a1b9ff3eb677922977b51bffd6f28b5846504f4f86265e015df18d0d0aa7da70a2d1ddd6bfa676e8d184e7db4e93321f8f3c287aa0eabf87f70cd3e45c0e31485c9c4ffdaf9342f9c6af51cb861e9099671829e050a22327c759d2766fd2a09f515e386651c9793d22781baf11328de0731936ab350235099ff78a75e6edefc0276470b6f01a0354a977fe629da4fe8b74204042ac7e2ee08931234fbef5ff653647fe42802784099ae2c61cc39249262595dafc2711dfb5b96dfbef3080aa49c02c6ccdd80849d884c1afb08e6c236e728dd1b8dbe34bc53e85b6e93ae979f79e75b1f33ea1d0c3aa50504d4db78c9c6779981f71e6d5ded864afa545419489027574c53c2be5d6fdaa783e0047216faf599d95db9ff28a29057650134eb9851df16b8abf8da4f011e59d7fbe8c6bc379d62858b32eea1f92586dcba624254a4bd0ca74b4ccba853e567a78ba0595b9bd33e807766a86bd39b91253e86f7293b43357a1881df4755067084f93d320e40f790d0eaae681c99f689bc5e3eac5821b16b8c0ba3c63ff2df6471fb5b7488c59ad1b5da9b093ce94945abe211fbe307e4e1f0bb3850b1998440bb614715a6a474ebd81b57c985c4fcf3e64a1075bd279fa9152a9bb34a4b82ac883af92f3941a24788ce5601736cd7b4ecf8f97753b7a42690774077adc344309807a170efe96f6b5d09cc96ef551a613e9d47e89cf771c925ec13e700513485009abec6f08476b05f59b40140c5eb6b653e67f44c689d8ee0362400cf24a08f88f47920961e9420518968c1fbc6a7110c84bac66c3036a042d6b981ece72eac89015cea8f3066205cb24413ab5cb489bdf6424a93773bc719e7f0993fe7255b8e84573c8b9e30382dec7e61f5266de7413f76d43c2b5ec50ccb420ce524e8744e958150954be439059ab7ac45a0b00dba42de700a429a9aacaf0eca9597ee560e0dcb1b92549a82e70aed6add3726aba7b89b410acc980b50f4a2fbabbd56a7e4f972fe7cfecafa5c755dec5d39c429faf719e531bf98ada69a6e8b4c1adcbddec738d23ea5bbb851585a3e8030d5892c776797d4446953935f820d309d717c2d67b1da4ae645119b970a0f42a730f37818a55362f34b339defde51998ce0e6744c009edb6545b91cae7ad064a7801f13278c189a7d69a3544ba664fca0cbbbe5e7fd849cd3d9b8a76144177f73221900ed2aa57ab687a2741f70a18385f43869c278593599010524c3e7194bc03e8a6cc37fff9e5aa4f8e416b6cd63037035d32a06230bc98de4503fb9f4061aabb52ea0e7e60542589b84525660002b0867996a9c3a1bdd711b0203476a9e312903848504f456d59a149b68ea34cfe3a7bba4d4ea9991f25d68e60f5cbf85923702f623a5db203e5a5706003b8ddf2cae3625567b92badc814e783193ab74855088aff0b32bda2397ac6389b91bc8148180fa738d0e4c4930416eeb1917d22d8157c64ded6f01da9f6a3c375a445ac543b93e6137dea5053ad3f1e3e151be6131cddf6db364568f9bd6206d2618a3a8d81816c4a87c0209e8b6bd20e295ca1701fa493dc09a7c0eacffa4cb585478a3f832a3bfa41b29f166e6fc2810b1776ee15976d1b6c4b1d317e13b48d4a64dec5fc77ee5e4060e227b06725ce8b2941a248cca9df062633279d0bb19c196db24b734b68b8b67167b72a54dd865f1bcc4b4c65ddbb53fb147949b02f29c8741b38cb797ebc18092871db7f119daef5b3ddaf8eb1bb916b4e0c75a34381c41e46e0675a887843b2704776fe1bdbc713e9f2a687903c675e545672dfd86fc293362eb6e967b1c458074a67eb740f48642eeb0293985b497cad454813611e6b4c528c57651394c5a5ddcd4ebdf8a13a78e2eff4ea04856799e3da2d16e607f2d6c9b2f1085184fe20a0237ed2e8a9ba6598932049f7e6c7cc07b5d7c163f2e13233b933f620b181b70c1104896aeda9afba997704b5913170e7524f4c6da79aa3e585555a577609239f78c348fa629394dcdfb72ef0afe7e8377c5df5228b1e5536fc61a64c8129d363cfb21420f213119fd4db81") wait4(0x0, 0x0, 0x1, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 07:35:23 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000018bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:23 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000200000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:23 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:23 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000040bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:23 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:23 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000048bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:23 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000019bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 740.397735][T12464] loop4: detected capacity change from 0 to 224 [ 740.402150][T12467] loop0: detected capacity change from 0 to 1 [ 740.407035][T12471] loop5: detected capacity change from 0 to 224 07:35:23 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:23 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 740.486692][T12467] loop0: p1 p2 p3 p4 [ 740.490938][T12467] loop0: p1 start 10 is beyond EOD, truncated [ 740.497015][T12467] loop0: p2 start 512 is beyond EOD, truncated [ 740.503269][T12467] loop0: p3 start 225 is beyond EOD, truncated [ 740.509452][T12467] loop0: p4 start 2415919104 is beyond EOD, truncated [ 740.525785][T12483] loop5: detected capacity change from 0 to 224 07:35:23 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000004cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:23 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000022bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 740.551075][T12494] loop4: detected capacity change from 0 to 224 [ 740.582176][T12467] loop0: detected capacity change from 0 to 1 [ 740.608468][T12508] loop5: detected capacity change from 0 to 224 [ 740.632438][T12467] loop0: p1 p2 p3 p4 [ 740.641813][T12467] loop0: p1 start 10 is beyond EOD, truncated [ 740.647908][T12467] loop0: p2 start 512 is beyond EOD, truncated [ 740.654093][T12467] loop0: p3 start 225 is beyond EOD, truncated [ 740.660266][T12467] loop0: p4 start 2415919104 is beyond EOD, truncated [ 740.687821][T12516] loop4: detected capacity change from 0 to 224 07:35:24 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) clone(0x0, &(0x7f0000000300)="050a08035e9c6e84a7fa1f8501eb580553fac62f43919cc89a35ba3bbe287412fd78ca0d91fba909e13846219490f646ad6f90ea7a062359ecb1e8e5ec08eebb988b3489e17e914a68252f8d5cfab62e8e8c2a019ebfdd572d7e85a5a340b3ff98fbea5970e6ee72468dd46dd1f726ea62fb9d529ccd5498c7d7099a7e0f6ca7a23d3de7d4cb3a6087f3daba46cfb75601f546c5fb3ae848aff3330b152b066273b0076748a2099d791998a95e0e01ec1f55ad2b897dd57c17c767826e807fc0c91b556f9905", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000006c0)="3e6d6e61afdad67b6cb54f60f7de80e57170e47ed953aa91cd8d13b6e11737fc84d53e479864ebd3cf34f57374c4c5f6bb6085d2ccef6e811f87f26fde94b3add4f2e75c9bffcfc96577b0ad6c4d51d58239600367370c30eb757f3df267887a4d093ad5ab5a10166cbc96016c1db259276047ad27362fb62c9c8776c34e20843788a14c3c35a4a285a6045e8254ed12b20c1e22018145a9a012b6e5e2cef9e099f788cfa66a3c21e9c471447abf1b5b9cb647f64b11e272c9b87e944d61ecae4fdebf910d51b39280981653b7c634a94ad3ae0e8a6521313b34eece2adfca1947e0fa76a44f0677071411023ba6e5dcb343c0c98398f299dfc44544e785878df99fa409e2f3e9cda3d5417d237db8a20b4bc08f62acb080ce2b4279fc1d6b0551ef20fbc1be1dc335a94b7097c06c00f331463daf893d414306a7f73c18d9cfbb14c71d5661753afd0a50a6394a4d32bf90ab4ee009190189bcba774ae11934ffbe13b78c6f5b0413af93b335a8628deba9b4c551716a48242f2ecc4bcfd4c313def108fe781eff7b88df891d47e64b6e512b6851463ea701221489057d7473149d642375fb4874ec32ae7f801889359ec16c9bcc1e344ab2e46d7b25b3063def2cac8da4bba1cdedd0dcd780fe49d19a57cc7b2999853d74ff2961bcdcf5c2054489dc9d169022cffb1245fca8646fbd8894f90f9f395fe7ee028449c87b52aeab6aaa2c7e364435ac19dd0bbe8f210c080b4bac2031d1a26f10a104165873e9da02179157f3767b08148a28f051771a7cf5836f72c5840cd7b3e8eab059165e0232335d053668cac0db230f047f5b3d3b9488e671b7e4d4031e32c6ed048ba02ef15a29b78485b7d91db156cac78aa5e33ced0b37012991266574cb6ca4e76329f14c293d443a7c1aa3a29011c58f2498b0bef76dfa3e876ef8bd1ed1f4bb3e55adc7672010a31eb1d081d65752f7ad75a1cb5b822c33ea6c6fa1e70992d63fd99717f5dc35a10648e6da98d70d2e9e37dad4c4d372ce697546a026a08280593ca309b0ce3c0be3795dacb5aaefa8cf23668b5ee2bf303586e1f514f689fd6745573a644cc1232459327d4465241709f5a1b6bc0ff1fffdb440663ff76dde00cb9a199c5fb3b169b8c2c76739c0a24697e88c7db2882faa69d73e6af20a985714f399d275e9cd981edaee8ecf8d0d5a1fcbb5cb4f9e162d1004c3a9969279fae145777bd03e5bba168041b07e900fd661be5307da3752b1f9521acfc1cf197ac5dffeac28fb37d3dd97fd35376c9718aa67a0d6667e88402412dfba6ae081a4ebb5061f6ca8f748d81431086b04b34be9a38ed080229a5fd8281a63f08c52b5c02c2d3bb6863fe37e20a4494a967e80f39ee8895f2559d1341532a96d9a200c8f3fd94de2d3ee5648ff64e70cecf0d285a5f550ee753d2ef80363292a1e03463347dc86a657ac62e305620d9e2b27bfd4e023599996740891d557314aa21444b58345715ddcdfd0da8cc16588c80836cc47c4b3229d27b193197fa45dfcc5e6d07486a20dd4572abdafd3e7cf62c720eb0e02390cd5d1bb9ba224b70a223bb8c4c9f8340194d4c247ed108238b89e82062df197ada1e0cacab7855808f279ead9784faafa50b35bc6847a0a2139ea966f484f7172ad070f86c581ae8f4ecb9a4bddc4a60ccf49481c4821e43ac51dbc39739c77d7517dfb660adb1f0df6a4e23c44cc455406da747d8a7ee52b7b3135f2ae38653ce0186649f3eb11ed31faa77240c725ce9aa27474d6a6436ffdbeb9bc4d364747215a5c4f061d36dbc72a46804c0c16609293effe79d9ba7c21cb78e7ffa25eb3da4218d284ed6ba0746a0056ecd5008e3b9cbdee6c6e2e3e78404b1f8a4718e32b4554177ab261e8092245dad6f792ef2d80a10e3fcf299306cbe94d5bd268623e09de0cb2c4c970cdca0c7726724efb2ffa2bed18e689dc222b31597b85072601928903ae2c07ef17b96a1c20c9514a5e0b998d911fbe18ab3811d365f5013329fb1d3204ef6d14b991ff89091bc45a3f4525e97554513c9ca8ea6500a9144523fd594de0f1b876b4c0ff02b1ef6db6320b937ca8ba5ab01dcd05a0904ba67da7b8d3c6975a40b544f5f715f15b616074b3f5fd4728237e8549a40f13162ea456dac78654911023f0a2aa6fc36da3ef3f693271800f883a8f1313ea0e1c8d38fbf16c1718ddca46ced68ca5153b59e5f2bdc03876ce37021ef55e9e3e753526e80cd1d22116dbc95f85d08af9d72aebd1828e537b61bf4dd9dca7ead026e6072d5c78a47169f947964cff3029e279c00ea1ede46ebf63f5988c9eed9a7f0be56f378b00454a312bf067e1b49fede3e406d26c15c513b5cff84d86b1e1d3ebef720f9eb30c357dbade920985590803d68b54b8cd06ecbecfdbd97c0d8c42279a2cfbe0c80e2c5f7377546db45e35aba919e645475d622a701536c72cf4489c0e97fdd54b0100c34c2907a67eef3b46f730027e5841a17b7a9fdb64406462cd0e68833abb7ff5b871491f9482d4b923feed9ff70fa739ccd641addc1d0c3a45f56c3acf3d4ca01c7fde715057b6547194126f6ff796fd09457704c93ade7b7839fd5907b32388bb68fcc6679e666344cfc85c81a8796485d98819411ec1401e4b462ed19471b23d87771f5cf3f7e687799b1c5af27e2ce51a130f34fed288955302267372d1d960d85f98e28ac39b0d46812c26f86e7389a96c3b866bfcb8d00f295ae9e7c826fcbff23d285ca973c3196f131edd8236c88485c7df6457c26a42e069606a91d05d8c99e851a37fdb3e569457e8f9af9708819fa8aee83a665cac3ba3e9f373655242298052e7f64693fb19308a676abf196e843bdb0c74f06e6ff24e348347aeb6350b9e646d5b29bc0d548d6daf10d03254193485952be9fe46fb46edd7015fb0809741b08d0c79f1770100b678f8a650394ce412e0a35dd1184de6360651d7b24e3a6f19ba953fdbecedf3564edc460641b1a0d57ab594079baa8fe3d63a8988757b3288058b652f5eb5799f52a3f9eccd9a8b096a10851f826a083472d04872b4f19fb4493a2b6d8811c25fea4008db7ecdbd372100f9c1f65353ff470e4a3de82e3dc67f4327a4a292b8ae65498774d59b9927f882907bf075e8b78f467c7e5fd184f70947d08278e4cd4dce2af4c5f51838d5ec228bc0ad8e20572e43e0c3f9e8805d4dd61e4a627fa8b8af0729344a8faf3134bbe235060ab7e3969ce87af8008dc0341477c7fac4aa1b3b70067e920f88abf1b082c3e90834567bdc6f44a9a986e8e4cbd692182c418d4b3a2bd0c5b75e6ea5d5a9878874d74bb779bbf27a40f362011ce954021acb3f78a7cc5252299faf7d1d634d437027afd54494b750614622aa33d893f53ba29f8a0f0660ca23574f9440d05a9c9885b7ecf2bf79cb3feae3c0bf811a32f2d9ffca70d98deab8bbda92c4b2646be118758273fc70d845345c9e8544c98952d5fb78ac9323c502705b88c06272ead0644c2017870fecf4f78d1fde0909170cd0db35bb2c97916f0583c991dd24859f573f1fa88acc248efbc2988730d242dab519c6a1cc8a2f356fec5905a62d74bd688f80d503e82787b80bdba77efca519299566cc656d00bfdff218f77ebaa7632414ad0bcd92177a602b2bcceed95840f12e0512e5f0e352586f234a2783cdbb163401b08c6dfa460a4565eb69a4a1b9ff3eb677922977b51bffd6f28b5846504f4f86265e015df18d0d0aa7da70a2d1ddd6bfa676e8d184e7db4e93321f8f3c287aa0eabf87f70cd3e45c0e31485c9c4ffdaf9342f9c6af51cb861e9099671829e050a22327c759d2766fd2a09f515e386651c9793d22781baf11328de0731936ab350235099ff78a75e6edefc0276470b6f01a0354a977fe629da4fe8b74204042ac7e2ee08931234fbef5ff653647fe42802784099ae2c61cc39249262595dafc2711dfb5b96dfbef3080aa49c02c6ccdd80849d884c1afb08e6c236e728dd1b8dbe34bc53e85b6e93ae979f79e75b1f33ea1d0c3aa50504d4db78c9c6779981f71e6d5ded864afa545419489027574c53c2be5d6fdaa783e0047216faf599d95db9ff28a29057650134eb9851df16b8abf8da4f011e59d7fbe8c6bc379d62858b32eea1f92586dcba624254a4bd0ca74b4ccba853e567a78ba0595b9bd33e807766a86bd39b91253e86f7293b43357a1881df4755067084f93d320e40f790d0eaae681c99f689bc5e3eac5821b16b8c0ba3c63ff2df6471fb5b7488c59ad1b5da9b093ce94945abe211fbe307e4e1f0bb3850b1998440bb614715a6a474ebd81b57c985c4fcf3e64a1075bd279fa9152a9bb34a4b82ac883af92f3941a24788ce5601736cd7b4ecf8f97753b7a42690774077adc344309807a170efe96f6b5d09cc96ef551a613e9d47e89cf771c925ec13e700513485009abec6f08476b05f59b40140c5eb6b653e67f44c689d8ee0362400cf24a08f88f47920961e9420518968c1fbc6a7110c84bac66c3036a042d6b981ece72eac89015cea8f3066205cb24413ab5cb489bdf6424a93773bc719e7f0993fe7255b8e84573c8b9e30382dec7e61f5266de7413f76d43c2b5ec50ccb420ce524e8744e958150954be439059ab7ac45a0b00dba42de700a429a9aacaf0eca9597ee560e0dcb1b92549a82e70aed6add3726aba7b89b410acc980b50f4a2fbabbd56a7e4f972fe7cfecafa5c755dec5d39c429faf719e531bf98ada69a6e8b4c1adcbddec738d23ea5bbb851585a3e8030d5892c776797d4446953935f820d309d717c2d67b1da4ae645119b970a0f42a730f37818a55362f34b339defde51998ce0e6744c009edb6545b91cae7ad064a7801f13278c189a7d69a3544ba664fca0cbbbe5e7fd849cd3d9b8a76144177f73221900ed2aa57ab687a2741f70a18385f43869c278593599010524c3e7194bc03e8a6cc37fff9e5aa4f8e416b6cd63037035d32a06230bc98de4503fb9f4061aabb52ea0e7e60542589b84525660002b0867996a9c3a1bdd711b0203476a9e312903848504f456d59a149b68ea34cfe3a7bba4d4ea9991f25d68e60f5cbf85923702f623a5db203e5a5706003b8ddf2cae3625567b92badc814e783193ab74855088aff0b32bda2397ac6389b91bc8148180fa738d0e4c4930416eeb1917d22d8157c64ded6f01da9f6a3c375a445ac543b93e6137dea5053ad3f1e3e151be6131cddf6db364568f9bd6206d2618a3a8d81816c4a87c0209e8b6bd20e295ca1701fa493dc09a7c0eacffa4cb585478a3f832a3bfa41b29f166e6fc2810b1776ee15976d1b6c4b1d317e13b48d4a64dec5fc77ee5e4060e227b06725ce8b2941a248cca9df062633279d0bb19c196db24b734b68b8b67167b72a54dd865f1bcc4b4c65ddbb53fb147949b02f29c8741b38cb797ebc18092871db7f119daef5b3ddaf8eb1bb916b4e0c75a34381c41e46e0675a887843b2704776fe1bdbc713e9f2a687903c675e545672dfd86fc293362eb6e967b1c458074a67eb740f48642eeb0293985b497cad454813611e6b4c528c57651394c5a5ddcd4ebdf8a13a78e2eff4ea04856799e3da2d16e607f2d6c9b2f1085184fe20a0237ed2e8a9ba6598932049f7e6c7cc07b5d7c163f2e13233b933f620b181b70c1104896aeda9afba997704b5913170e7524f4c6da79aa3e585555a577609239f78c348fa629394dcdfb72ef0afe7e8377c5df5228b1e5536fc61a64c8129d363cfb21420f213119fd4db81") wait4(0x0, 0x0, 0x1, 0x0) 07:35:24 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000158bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:24 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:24 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000400000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:24 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:24 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000025bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:24 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000161bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:24 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000048bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 741.262941][T12535] loop5: detected capacity change from 0 to 224 [ 741.272865][T12538] loop4: detected capacity change from 0 to 224 [ 741.284925][T12540] loop0: detected capacity change from 0 to 1 07:35:24 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 741.353011][T12540] loop0: p1 p2 p3 p4 [ 741.361277][T12540] loop0: p1 start 10 is beyond EOD, truncated [ 741.367392][T12540] loop0: p2 start 1024 is beyond EOD, truncated [ 741.373673][T12540] loop0: p3 start 225 is beyond EOD, truncated [ 741.379841][T12540] loop0: p4 start 2415919104 is beyond EOD, truncated [ 741.392254][T12559] loop4: detected capacity change from 0 to 224 07:35:24 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:24 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000004cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:24 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000068bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 741.404229][T12557] loop5: detected capacity change from 0 to 224 [ 741.459464][T12571] loop4: detected capacity change from 0 to 224 [ 741.483203][T12540] loop0: detected capacity change from 0 to 1 [ 741.528158][T12583] loop5: detected capacity change from 0 to 224 07:35:25 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) clone(0x0, &(0x7f0000000300)="050a08035e9c6e84a7fa1f8501eb580553fac62f43919cc89a35ba3bbe287412fd78ca0d91fba909e13846219490f646ad6f90ea7a062359ecb1e8e5ec08eebb988b3489e17e914a68252f8d5cfab62e8e8c2a019ebfdd572d7e85a5a340b3ff98fbea5970e6ee72468dd46dd1f726ea62fb9d529ccd5498c7d7099a7e0f6ca7a23d3de7d4cb3a6087f3daba46cfb75601f546c5fb3ae848aff3330b152b066273b0076748a2099d791998a95e0e01ec1f55ad2b897dd57c17c767826e807fc0c91b556f9905", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000006c0)="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") 07:35:25 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:25 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000800000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:25 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000068bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:25 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) getdents64(0xffffffffffffffff, &(0x7f00000001c0)=""/267, 0x18) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/47, 0x2f) 07:35:25 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000006cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:25 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000074bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 742.173044][T12608] loop0: detected capacity change from 0 to 1 [ 742.182777][T12610] loop5: detected capacity change from 0 to 224 [ 742.189584][T12605] loop4: detected capacity change from 0 to 224 [ 742.212787][T12608] loop0: p1 p2 p3 p4 [ 742.217031][T12608] loop0: p1 start 10 is beyond EOD, truncated 07:35:25 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000006cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:25 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 742.223302][T12608] loop0: p2 start 2048 is beyond EOD, truncated [ 742.229670][T12608] loop0: p3 start 225 is beyond EOD, truncated [ 742.235826][T12608] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:25 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000278bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:25 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000840000800000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:25 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) getdents64(0xffffffffffffffff, &(0x7f00000001c0)=""/267, 0x18) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/47, 0x2f) [ 742.276511][T12626] loop5: detected capacity change from 0 to 224 [ 742.368937][T12641] loop0: detected capacity change from 0 to 1 [ 742.386211][T12645] loop5: detected capacity change from 0 to 224 [ 742.388652][T12646] loop4: detected capacity change from 0 to 224 [ 742.449528][T12641] loop0: p1 p2 p3 p4 [ 742.453838][T12641] loop0: p1 start 10 is beyond EOD, truncated [ 742.459961][T12641] loop0: p2 start 2048 is beyond EOD, truncated [ 742.466231][T12641] loop0: p3 start 225 is beyond EOD, truncated [ 742.472433][T12641] loop0: p4 start 2415919104 is beyond EOD, truncated [ 742.513141][T12641] loop0: detected capacity change from 0 to 1 [ 742.549494][T12641] loop0: p1 p2 p3 p4 [ 742.553741][T12641] loop0: p1 start 10 is beyond EOD, truncated [ 742.559817][T12641] loop0: p2 start 2048 is beyond EOD, truncated [ 742.566066][T12641] loop0: p3 start 225 is beyond EOD, truncated [ 742.572499][T12641] loop0: p4 start 2415919104 is beyond EOD, truncated [ 742.639792][ T1039] loop0: p1 p2 p3 p4 [ 742.644017][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 742.650214][ T1039] loop0: p2 start 2048 is beyond EOD, truncated [ 742.656454][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 742.662745][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:26 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:26 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:26 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) getdents64(0xffffffffffffffff, &(0x7f00000001c0)=""/267, 0x18) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/47, 0x2f) 07:35:26 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000279bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000074bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:26 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800001000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:26 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000007abf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000007abf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 743.109774][T12675] loop4: detected capacity change from 0 to 224 [ 743.110502][T12677] loop5: detected capacity change from 0 to 224 [ 743.121406][T12679] loop0: detected capacity change from 0 to 1 07:35:26 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/267, 0x18) getdents64(r0, &(0x7f0000000080)=""/47, 0x2f) 07:35:26 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800002000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) [ 743.170881][T12679] loop0: p1 p2 p3 p4 [ 743.175088][T12679] loop0: p1 start 10 is beyond EOD, truncated [ 743.181242][T12679] loop0: p2 start 4096 is beyond EOD, truncated [ 743.187654][T12679] loop0: p3 start 225 is beyond EOD, truncated [ 743.193828][T12679] loop0: p4 start 2415919104 is beyond EOD, truncated [ 743.234309][T12699] loop4: detected capacity change from 0 to 224 [ 743.250423][T12706] loop5: detected capacity change from 0 to 224 07:35:26 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r0, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000000000febf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:26 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:26 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000186bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 743.317101][T12715] loop0: detected capacity change from 0 to 1 07:35:26 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/267, 0x18) getdents64(r0, &(0x7f0000000080)=""/47, 0x2f) [ 743.373308][T12715] loop0: p1 p2 p3 p4 [ 743.377647][T12715] loop0: p1 start 10 is beyond EOD, truncated [ 743.383768][T12715] loop0: p2 start 8192 is beyond EOD, truncated [ 743.390020][T12715] loop0: p3 start 225 is beyond EOD, truncated [ 743.396167][T12715] loop0: p4 start 2415919104 is beyond EOD, truncated [ 743.406164][T12726] loop4: detected capacity change from 0 to 224 [ 743.412875][T12729] loop5: detected capacity change from 0 to 224 07:35:26 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000187bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:26 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r0, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:26 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800009000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf020000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:26 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/267, 0x18) getdents64(r0, &(0x7f0000000080)=""/47, 0x2f) 07:35:26 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000029ebf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 743.463840][T12715] loop0: detected capacity change from 0 to 1 [ 743.499419][T12741] loop5: detected capacity change from 0 to 224 07:35:26 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000000002a6bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:26 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/267, 0x18) getdents64(r0, &(0x7f0000000080)=""/47, 0x2f) [ 743.570289][T12757] loop5: detected capacity change from 0 to 224 [ 743.596540][T12763] loop0: detected capacity change from 0 to 1 [ 743.609559][T12765] loop4: detected capacity change from 0 to 224 07:35:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf030000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 743.646034][T12763] loop0: p1 p2 p3 p4 [ 743.657821][T12763] loop0: p1 start 10 is beyond EOD, truncated [ 743.664089][T12763] loop0: p2 start 36864 is beyond EOD, truncated [ 743.670504][T12763] loop0: p3 start 225 is beyond EOD, truncated [ 743.676877][T12763] loop0: p4 start 2415919104 is beyond EOD, truncated [ 743.702607][T12777] loop5: detected capacity change from 0 to 224 [ 743.710333][T12763] loop0: detected capacity change from 0 to 1 [ 743.712943][T12778] loop4: detected capacity change from 0 to 224 [ 743.760225][T12763] loop0: p1 p2 p3 p4 [ 743.765114][T12763] loop0: p1 start 10 is beyond EOD, truncated [ 743.771472][T12763] loop0: p2 start 36864 is beyond EOD, truncated [ 743.777782][T12763] loop0: p3 start 225 is beyond EOD, truncated [ 743.783946][T12763] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:27 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4208, r1) 07:35:27 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r0, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:27 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000fffebf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:27 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf040000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:27 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080000c000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:27 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/267, 0x18) getdents64(r0, &(0x7f0000000080)=""/47, 0x2f) [ 744.287486][T12805] loop4: detected capacity change from 0 to 224 [ 744.296251][T12807] loop0: detected capacity change from 0 to 1 [ 744.303418][T12809] loop5: detected capacity change from 0 to 224 07:35:27 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/267, 0x18) getdents64(r0, &(0x7f0000000080)=""/47, 0x2f) 07:35:27 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000fffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:27 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf050000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:27 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008ffffe000000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:27 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 744.370335][T12807] loop0: p1 p2 p3 p4 [ 744.375312][T12807] loop0: p1 start 10 is beyond EOD, truncated [ 744.381431][T12807] loop0: p2 start 49152 is beyond EOD, truncated [ 744.387756][T12807] loop0: p3 start 225 is beyond EOD, truncated [ 744.394367][T12807] loop0: p4 start 2415919104 is beyond EOD, truncated [ 744.449033][T12830] loop0: detected capacity change from 0 to 1 [ 744.478624][T12837] loop4: detected capacity change from 0 to 224 07:35:27 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 744.502441][T12842] loop5: detected capacity change from 0 to 224 [ 744.514482][T12830] loop0: p1 p2 p3 p4 [ 744.521990][T12830] loop0: p1 start 10 is beyond EOD, truncated [ 744.528199][T12830] loop0: p2 start 57599 is beyond EOD, truncated [ 744.534669][T12830] loop0: p3 start 225 is beyond EOD, truncated [ 744.540839][T12830] loop0: p4 start 2415919104 is beyond EOD, truncated [ 744.602634][T12830] loop0: detected capacity change from 0 to 1 [ 744.629534][T12830] loop0: p1 p2 p3 p4 [ 744.633825][T12830] loop0: p1 start 10 is beyond EOD, truncated [ 744.639917][T12830] loop0: p2 start 57599 is beyond EOD, truncated [ 744.646275][T12830] loop0: p3 start 225 is beyond EOD, truncated [ 744.652508][T12830] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:28 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4208, r1) 07:35:28 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf060000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:28 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:28 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000feffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:28 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000001000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 745.182461][T12866] loop5: detected capacity change from 0 to 224 [ 745.186889][T12863] loop0: detected capacity change from 0 to 1 07:35:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:28 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000002bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 745.235305][T12870] loop4: detected capacity change from 0 to 224 [ 745.271012][T12863] loop0: p1 p2 p3 p4 [ 745.276407][T12863] loop0: p1 start 10 is beyond EOD, truncated 07:35:28 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) [ 745.282550][T12863] loop0: p2 start 65536 is beyond EOD, truncated [ 745.288875][T12863] loop0: p3 start 225 is beyond EOD, truncated [ 745.295066][T12863] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf070000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 745.360784][T12897] loop5: detected capacity change from 0 to 224 [ 745.400296][T12863] loop0: detected capacity change from 0 to 1 [ 745.412062][T12908] loop4: detected capacity change from 0 to 224 [ 745.443173][T12863] loop0: p1 p2 p3 p4 [ 745.447436][T12863] loop0: p1 start 10 is beyond EOD, truncated [ 745.453612][T12863] loop0: p2 start 65536 is beyond EOD, truncated [ 745.459979][T12863] loop0: p3 start 225 is beyond EOD, truncated [ 745.466162][T12863] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:29 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4208, r1) 07:35:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:29 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:29 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000003bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf080000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:29 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000002000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:29 executing program 2: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:29 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:29 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000004bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf090000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 746.098252][T12926] loop4: detected capacity change from 0 to 224 [ 746.106154][T12928] loop5: detected capacity change from 0 to 224 [ 746.114873][T12930] loop0: detected capacity change from 0 to 1 07:35:29 executing program 2: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 746.172416][T12930] loop0: p1 p2 p3 p4 [ 746.176632][T12930] loop0: p1 start 10 is beyond EOD, truncated [ 746.182760][T12930] loop0: p2 start 131072 is beyond EOD, truncated [ 746.189252][T12930] loop0: p3 start 225 is beyond EOD, truncated [ 746.195462][T12930] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:29 executing program 2: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 746.252305][T12962] loop4: detected capacity change from 0 to 224 [ 746.260899][T12957] loop5: detected capacity change from 0 to 224 [ 746.322269][T12930] loop0: detected capacity change from 0 to 1 [ 746.363167][T12930] loop0: p1 p2 p3 p4 [ 746.368060][T12930] loop0: p1 start 10 is beyond EOD, truncated [ 746.374269][T12930] loop0: p2 start 131072 is beyond EOD, truncated [ 746.380740][T12930] loop0: p3 start 225 is beyond EOD, truncated [ 746.387256][T12930] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:29 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000005bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:29 executing program 1: syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/267, 0x18) getdents64(r0, &(0x7f0000000080)=""/47, 0x2f) 07:35:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0a0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:29 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:29 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:29 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000402000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:29 executing program 1: syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/267, 0x18) getdents64(r0, &(0x7f0000000080)=""/47, 0x2f) [ 746.986095][T12990] loop4: detected capacity change from 0 to 224 [ 747.010582][T12994] loop5: detected capacity change from 0 to 224 07:35:30 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000006bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:30 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0b0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:30 executing program 1: syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/267, 0x18) getdents64(r0, &(0x7f0000000080)=""/47, 0x2f) [ 747.053110][T12995] loop0: detected capacity change from 0 to 1 [ 747.091560][T12995] loop0: p1 p2 p3 p4 [ 747.101871][T12995] loop0: p1 start 10 is beyond EOD, truncated [ 747.107974][T12995] loop0: p2 start 132096 is beyond EOD, truncated [ 747.114420][T12995] loop0: p3 start 225 is beyond EOD, truncated [ 747.120614][T12995] loop0: p4 start 2415919104 is beyond EOD, truncated [ 747.142614][T13018] loop5: detected capacity change from 0 to 224 07:35:30 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() ptrace(0x4206, r1) ptrace(0x4208, r1) [ 747.151075][T13019] loop4: detected capacity change from 0 to 224 07:35:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:30 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:30 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000007bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0c0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:30 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() ptrace(0x4206, r1) ptrace(0x4208, r1) [ 747.214152][T12995] loop0: detected capacity change from 0 to 1 [ 747.279488][T12995] loop0: p1 p2 p3 p4 [ 747.290191][T12995] loop0: p1 start 10 is beyond EOD, truncated [ 747.296287][T12995] loop0: p2 start 132096 is beyond EOD, truncated [ 747.302862][T12995] loop0: p3 start 225 is beyond EOD, truncated [ 747.309013][T12995] loop0: p4 start 2415919104 is beyond EOD, truncated [ 747.310264][T13048] loop5: detected capacity change from 0 to 224 07:35:30 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:30 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000003000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:30 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000640)) ptrace(0x4206, 0x0) ptrace(0x4208, 0x0) 07:35:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:30 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000008bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0d0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 747.347339][T13058] loop4: detected capacity change from 0 to 224 07:35:30 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000640)) ptrace(0x4206, 0x0) ptrace(0x4208, 0x0) [ 747.399643][ T1039] loop0: p1 p2 p3 p4 [ 747.403926][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 747.410065][ T1039] loop0: p2 start 132096 is beyond EOD, truncated [ 747.416600][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 747.422800][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:30 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:30 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000009bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) [ 747.448046][T13072] loop4: detected capacity change from 0 to 224 [ 747.462111][T13076] loop5: detected capacity change from 0 to 224 07:35:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0e0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:30 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000640)) ptrace(0x4206, 0x0) ptrace(0x4208, 0x0) 07:35:30 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 747.535905][T13087] loop0: detected capacity change from 0 to 1 [ 747.572090][T13087] loop0: p1 p2 p3 p4 [ 747.576472][T13087] loop0: p1 start 10 is beyond EOD, truncated [ 747.580140][T13109] loop4: detected capacity change from 0 to 224 [ 747.582577][T13087] loop0: p2 start 196608 is beyond EOD, truncated [ 747.589121][T13110] loop5: detected capacity change from 0 to 224 [ 747.595212][T13087] loop0: p3 start 225 is beyond EOD, truncated [ 747.595275][T13087] loop0: p4 start 2415919104 is beyond EOD, truncated [ 747.675328][T13087] loop0: detected capacity change from 0 to 1 07:35:30 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000004000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:30 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:30 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0f0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:30 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000abf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 747.721758][T13087] loop0: p1 p2 p3 p4 [ 747.725963][T13087] loop0: p1 start 10 is beyond EOD, truncated [ 747.732276][T13087] loop0: p2 start 196608 is beyond EOD, truncated [ 747.738684][T13087] loop0: p3 start 225 is beyond EOD, truncated [ 747.744889][T13087] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:30 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) [ 747.844661][T13149] loop0: detected capacity change from 0 to 1 [ 747.846117][T13146] loop5: detected capacity change from 0 to 224 [ 747.862374][T13148] loop4: detected capacity change from 0 to 224 07:35:30 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000bbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:30 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf100000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 747.930113][T13149] loop0: p1 p2 p3 p4 [ 747.935080][T13149] loop0: p1 start 10 is beyond EOD, truncated [ 747.941196][T13149] loop0: p2 start 262144 is beyond EOD, truncated [ 747.947633][T13149] loop0: p3 start 225 is beyond EOD, truncated [ 747.953936][T13149] loop0: p4 start 2415919104 is beyond EOD, truncated [ 748.015820][T13149] loop0: detected capacity change from 0 to 1 [ 748.028154][T13180] loop4: detected capacity change from 0 to 224 [ 748.033320][T13181] loop5: detected capacity change from 0 to 224 07:35:31 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000005000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:31 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:31 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:31 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf110000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 748.060649][T13149] loop0: p1 p2 p3 p4 [ 748.072308][T13149] loop0: p1 start 10 is beyond EOD, truncated [ 748.078433][T13149] loop0: p2 start 262144 is beyond EOD, truncated [ 748.084957][T13149] loop0: p3 start 225 is beyond EOD, truncated [ 748.091151][T13149] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) [ 748.163379][T13202] loop4: detected capacity change from 0 to 224 07:35:31 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf120000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:31 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:31 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000dbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 748.205491][T13206] loop5: detected capacity change from 0 to 224 [ 748.228609][T13213] loop0: detected capacity change from 0 to 1 [ 748.307491][T13213] loop0: p1 p2 p3 p4 [ 748.316609][T13213] loop0: p1 start 10 is beyond EOD, truncated [ 748.322927][T13213] loop0: p2 start 327680 is beyond EOD, truncated [ 748.329444][T13213] loop0: p3 start 225 is beyond EOD, truncated [ 748.335699][T13213] loop0: p4 start 2415919104 is beyond EOD, truncated [ 748.362218][T13234] loop5: detected capacity change from 0 to 224 [ 748.374407][T13235] loop4: detected capacity change from 0 to 224 [ 748.423157][T13213] loop0: detected capacity change from 0 to 1 07:35:31 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000006000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:31 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:31 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000ebf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf180000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:31 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000640)) ptrace(0x4206, r0) ptrace(0x4208, r0) [ 748.481730][T13213] loop0: p1 p2 p3 p4 [ 748.485889][T13213] loop0: p1 start 10 is beyond EOD, truncated [ 748.491976][T13213] loop0: p2 start 327680 is beyond EOD, truncated [ 748.498384][T13213] loop0: p3 start 225 is beyond EOD, truncated [ 748.504609][T13213] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:31 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:31 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000000fbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 748.596541][T13260] loop5: detected capacity change from 0 to 224 [ 748.604846][T13261] loop4: detected capacity change from 0 to 224 07:35:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf190000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) [ 748.729991][T13282] loop5: detected capacity change from 0 to 224 [ 748.736272][T13284] loop4: detected capacity change from 0 to 224 [ 748.747376][T13285] loop0: detected capacity change from 0 to 1 07:35:31 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000010bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 748.792461][T13285] loop0: p1 p2 p3 p4 [ 748.796666][T13285] loop0: p1 start 10 is beyond EOD, truncated [ 748.802821][T13285] loop0: p2 start 393216 is beyond EOD, truncated [ 748.809282][T13285] loop0: p3 start 225 is beyond EOD, truncated [ 748.815455][T13285] loop0: p4 start 2415919104 is beyond EOD, truncated [ 748.865715][T13302] loop5: detected capacity change from 0 to 224 [ 748.889553][T13285] loop0: detected capacity change from 0 to 1 [ 748.929952][ T1039] loop0: p1 p2 p3 p4 [ 748.934059][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 748.940151][ T1039] loop0: p2 start 393216 is beyond EOD, truncated [ 748.946560][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 748.953029][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated [ 748.960097][T13285] loop0: p1 p2 p3 p4 [ 748.964455][T13285] loop0: p1 start 10 is beyond EOD, truncated [ 748.970571][T13285] loop0: p2 start 393216 is beyond EOD, truncated 07:35:31 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000406000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf220000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:31 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:31 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000011bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 748.976997][T13285] loop0: p3 start 225 is beyond EOD, truncated [ 748.983163][T13285] loop0: p4 start 2415919104 is beyond EOD, truncated [ 749.028957][T13321] loop4: detected capacity change from 0 to 224 [ 749.038113][T13322] loop5: detected capacity change from 0 to 224 [ 749.097112][T13336] loop0: detected capacity change from 0 to 1 [ 749.130048][T13336] loop0: p1 p2 p3 p4 [ 749.134231][T13336] loop0: p1 start 10 is beyond EOD, truncated [ 749.140469][T13336] loop0: p2 start 394240 is beyond EOD, truncated [ 749.146970][T13336] loop0: p3 start 225 is beyond EOD, truncated [ 749.153499][T13336] loop0: p4 start 2415919104 is beyond EOD, truncated [ 749.190087][T13336] loop0: detected capacity change from 0 to 1 [ 749.229774][T13336] loop0: p1 p2 p3 p4 [ 749.234056][T13336] loop0: p1 start 10 is beyond EOD, truncated [ 749.240151][T13336] loop0: p2 start 394240 is beyond EOD, truncated [ 749.246594][T13336] loop0: p3 start 225 is beyond EOD, truncated [ 749.252751][T13336] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:32 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000640)) ptrace(0x4206, r0) ptrace(0x4208, r0) 07:35:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf250000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:32 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000012bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:32 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:32 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000007000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf480000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:32 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:32 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000018bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 749.480804][T13354] loop4: detected capacity change from 0 to 224 [ 749.492746][T13355] loop5: detected capacity change from 0 to 224 [ 749.504893][T13360] loop0: detected capacity change from 0 to 1 07:35:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/47, 0x2f) [ 749.573779][T13360] loop0: p1 p2 p3 p4 [ 749.578012][T13360] loop0: p1 start 10 is beyond EOD, truncated [ 749.584128][T13360] loop0: p2 start 458752 is beyond EOD, truncated [ 749.590577][T13360] loop0: p3 start 225 is beyond EOD, truncated [ 749.596741][T13360] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:32 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000019bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 749.625238][T13382] loop5: detected capacity change from 0 to 224 [ 749.646903][T13386] loop4: detected capacity change from 0 to 224 [ 749.671940][T13360] loop0: detected capacity change from 0 to 1 [ 749.703248][T13394] loop5: detected capacity change from 0 to 224 [ 749.741851][T13360] loop0: p1 p2 p3 p4 [ 749.746227][T13360] loop0: p1 start 10 is beyond EOD, truncated [ 749.752501][T13360] loop0: p2 start 458752 is beyond EOD, truncated [ 749.759055][T13360] loop0: p3 start 225 is beyond EOD, truncated [ 749.765276][T13360] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:33 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000640)) ptrace(0x4206, r0) ptrace(0x4208, r0) 07:35:33 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/47, 0x2f) 07:35:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf4c0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:33 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:33 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000022bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:33 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000008000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:33 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000025bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:33 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/47, 0x2f) 07:35:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf680000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 750.377950][T13410] loop5: detected capacity change from 0 to 224 [ 750.400201][T13412] loop0: detected capacity change from 0 to 1 [ 750.414127][T13414] loop4: detected capacity change from 0 to 224 07:35:33 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 750.482296][T13412] loop0: p1 p2 p3 p4 [ 750.486855][T13412] loop0: p1 start 10 is beyond EOD, truncated [ 750.493142][T13412] loop0: p2 start 524288 is beyond EOD, truncated [ 750.499697][T13412] loop0: p3 start 225 is beyond EOD, truncated [ 750.506034][T13412] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:33 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, 0x0, 0x0) [ 750.529779][T13427] loop5: detected capacity change from 0 to 224 07:35:33 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000048bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 750.586923][T13442] loop4: detected capacity change from 0 to 224 [ 750.611743][T13412] loop0: detected capacity change from 0 to 1 [ 750.634710][T13451] loop5: detected capacity change from 0 to 224 [ 750.652175][T13412] loop0: p1 p2 p3 p4 [ 750.656948][T13412] loop0: p1 start 10 is beyond EOD, truncated [ 750.663302][T13412] loop0: p2 start 524288 is beyond EOD, truncated [ 750.670267][T13412] loop0: p3 start 225 is beyond EOD, truncated [ 750.676509][T13412] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:34 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000640)) ptrace(0x4206, r0) ptrace(0x4208, r0) 07:35:34 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, 0x0, 0x0) 07:35:34 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf6c0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:34 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:34 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000004cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:34 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000009000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:34 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, 0x0, 0x0) 07:35:34 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf740000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 751.313394][T13469] loop4: detected capacity change from 0 to 224 [ 751.320408][T13468] loop5: detected capacity change from 0 to 224 [ 751.344408][T13477] loop0: detected capacity change from 0 to 1 07:35:34 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000068bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:34 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000022bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 751.380579][T13477] loop0: p1 p2 p3 p4 [ 751.388221][T13477] loop0: p1 start 10 is beyond EOD, truncated [ 751.394487][T13477] loop0: p2 start 589824 is beyond EOD, truncated [ 751.400930][T13477] loop0: p3 start 225 is beyond EOD, truncated [ 751.407104][T13477] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:34 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080000000a000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:34 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 751.500469][T13500] loop5: detected capacity change from 0 to 224 [ 751.506501][T13501] loop0: detected capacity change from 0 to 1 [ 751.507227][T13502] loop1: detected capacity change from 0 to 224 [ 751.520007][T13498] loop4: detected capacity change from 0 to 224 [ 751.578925][T13501] loop0: p1 p2 p3 p4 [ 751.584746][T13501] loop0: p1 start 10 is beyond EOD, truncated [ 751.590994][T13501] loop0: p2 start 655360 is beyond EOD, truncated [ 751.597601][T13501] loop0: p3 start 225 is beyond EOD, truncated [ 751.603937][T13501] loop0: p4 start 2415919104 is beyond EOD, truncated [ 751.671094][T13501] loop0: detected capacity change from 0 to 1 [ 751.729679][T13501] loop0: p1 p2 p3 p4 [ 751.733868][T13501] loop0: p1 start 10 is beyond EOD, truncated [ 751.740050][T13501] loop0: p2 start 655360 is beyond EOD, truncated [ 751.746601][T13501] loop0: p3 start 225 is beyond EOD, truncated [ 751.752760][T13501] loop0: p4 start 2415919104 is beyond EOD, truncated [ 751.829642][ T1039] loop0: p1 p2 p3 p4 [ 751.834007][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 751.840084][ T1039] loop0: p2 start 655360 is beyond EOD, truncated [ 751.847099][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 751.853269][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:35 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000640)) ptrace(0x4206, r0) ptrace(0x4208, r0) 07:35:35 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000006cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:35 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf7a0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:35 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000022bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:35 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:35 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080000000b000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0xfff, 0x0) io_setup(0x81, &(0x7f0000000100)=0x0) write$binfmt_misc(r1, &(0x7f00000001c0)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x5a21cf72}) fcntl$setstatus(r1, 0x4, 0x6800) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) r3 = socket$netlink(0x10, 0x3, 0x10) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r5, 0x8, 0x0) io_submit(r2, 0x2, &(0x7f0000000140)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x6, r3, &(0x7f0000000300)="0801f0e50a4db91522218563654c329f8cb9b9f6d1c0c8d8ec2808ac192e5d4ca5a13500ef7a593d74b9b40a705e2f8c3c6f7b08f8b6fb5d9edfee8d353571528921e84b108ddf4ab42f940b23e1dcb311f5fd6ea42d5133694f967a88be3f671b7e20d24e999af2b05716d8a2b2d7c017adb80e6eace582f32135bd51309c4cda4d35e832df5c3dd03e593b502edab8cfff362b76fcc1f93e4be48ea2074effb28651ac7d6a51c7409f53bed9a63db69778f63ba31c8e08b33e5a5e3a417863a75550897ad44aeeb35f8de7abec0df98958e9b21f6bf6612f4d", 0xda, 0xff, 0x0, 0x0, r4}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0xa7a0, r0, &(0x7f0000000400)="dcdad41dc6750a8057022ffea758eb5db53cef5cf60f98e89aeb8ad7a323a998cdf79e49a92d93f082074fa242ee953462f55fba809ed3bf8a45f52b658ae4cfa365befcbbdd15ff3ef153a49e8d23335a77200ac655c499114adcd75931c017f13bae621ffe132c233eb3aad51b786fe38cdba8716d928d0ff394bb0d5e9c62be506442523391173930d22538dbc4562a0f5383629d2f13a03f388b288798f901956b705ef1b0c072937045f1d260cbc12f6b9217cac626fa6d5fb5221b6d7b1aa2842edc28808e81a1f21865ca7ca4cab03f8353e0ea06abf078fc5cb4efa74ae57328cb07da84cbbeef4cc18e8a", 0xef, 0x9, 0x0, 0x0, r5}]) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r6, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r7, &(0x7f00000001c0)=""/267, 0x18) [ 752.230228][T13535] loop1: detected capacity change from 0 to 224 [ 752.245844][T13537] loop0: detected capacity change from 0 to 1 [ 752.248985][T13540] loop5: detected capacity change from 0 to 224 [ 752.256743][T13539] loop4: detected capacity change from 0 to 224 07:35:35 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000074bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:35 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bffe0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 752.322052][T13537] loop0: p1 p2 p3 p4 [ 752.327977][T13537] loop0: p1 start 10 is beyond EOD, truncated [ 752.334130][T13537] loop0: p2 start 720896 is beyond EOD, truncated [ 752.340569][T13537] loop0: p3 start 225 is beyond EOD, truncated [ 752.346744][T13537] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:35 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 752.396112][T13562] loop5: detected capacity change from 0 to 224 [ 752.397153][T13537] loop0: detected capacity change from 0 to 1 07:35:35 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000007abf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:35 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf040200000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 752.439509][T13537] loop0: p1 p2 p3 p4 [ 752.443726][T13537] loop0: p1 start 10 is beyond EOD, truncated [ 752.450114][T13537] loop0: p2 start 720896 is beyond EOD, truncated [ 752.456619][T13537] loop0: p3 start 225 is beyond EOD, truncated [ 752.462817][T13537] loop0: p4 start 2415919104 is beyond EOD, truncated [ 752.474465][T13570] loop4: detected capacity change from 0 to 224 [ 752.527171][T13580] loop5: detected capacity change from 0 to 224 [ 752.534375][ T1039] loop0: p1 p2 p3 p4 [ 752.544941][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 752.546615][T13583] loop4: detected capacity change from 0 to 224 [ 752.551072][ T1039] loop0: p2 start 720896 is beyond EOD, truncated [ 752.563733][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 752.569906][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:38 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000640)) ptrace(0x4206, r0) ptrace(0x4208, r0) 07:35:38 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080000000c000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:38 executing program 1 (fault-call:4 fault-nth:0): r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:38 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:38 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000000000febf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:38 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf780200000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) [ 755.290312][T13603] loop5: detected capacity change from 0 to 224 [ 755.300312][T13605] loop4: detected capacity change from 0 to 224 [ 755.315629][T13608] loop0: detected capacity change from 0 to 1 07:35:38 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf020000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:38 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bfa60200000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:38 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x18) [ 755.381954][T13608] loop0: p1 p2 p3 p4 [ 755.387274][T13608] loop0: p1 start 10 is beyond EOD, truncated [ 755.393482][T13608] loop0: p2 start 786432 is beyond EOD, truncated [ 755.399921][T13608] loop0: p3 start 225 is beyond EOD, truncated [ 755.406117][T13608] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:38 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 755.450552][T13608] loop0: detected capacity change from 0 to 1 [ 755.457767][T13631] loop4: detected capacity change from 0 to 224 [ 755.476737][T13637] loop5: detected capacity change from 0 to 224 [ 755.490112][T13608] loop0: p1 p2 p3 p4 [ 755.494413][T13608] loop0: p1 start 10 is beyond EOD, truncated [ 755.500514][T13608] loop0: p2 start 786432 is beyond EOD, truncated [ 755.506927][T13608] loop0: p3 start 225 is beyond EOD, truncated [ 755.513102][T13608] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:39 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:39 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bfa70200000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:39 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x3f, 0x1e, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x80100, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x8, 0x0) r3 = epoll_create(0x400) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r4, 0x8, 0x0) dup3(r2, r1, 0x80000) write$sndseq(r1, &(0x7f00000016c0)=[{0x5, 0xff, 0xe0, 0xea, @time={0x800, 0x8001}, {0x5, 0x8}, {0x9, 0x6}, @connect={{0x7}, {0x4, 0xc0}}}, {0x40, 0x81, 0x5, 0x3b, @time={0x3, 0x4}, {0xa, 0x9}, {0x20, 0x9}, @quote={{0x2, 0x92}, 0x8, &(0x7f0000001600)={0xbd, 0x2, 0x8, 0xcf, @time={0x5, 0x3a1}, {0x8, 0x1}, {0x5, 0x4}, @time=@tick=0xf8a}}}, {0x9, 0xff, 0x3f, 0x8, @time={0x2, 0x6}, {0x3f, 0x5}, {0x2, 0x1}, @ext={0x64, &(0x7f0000001640)="a1322a38463c042bb5e34e0b832ea585c05b9234a43ebeb5c76fc0ce09b40e77514893a7d87f7dd59e06e2aa000744c971d646a974dad7d3895a07f98e16c753cf37ee76e17cde29f46dc450c700339996d5a062997c37a04f2c3f5252d67bf8e0fc4f0c"}}, {0x8, 0x4, 0x0, 0x8, @tick=0x6, {0x1f, 0x75}, {0x80, 0x86}, @queue={0x3f}}, {0x9, 0x6, 0x8, 0x20, @tick=0x5c6, {0xfe, 0x40}, {0x0, 0x2}, @note={0x37, 0x1f, 0x7, 0x3f, 0x81}}], 0x8c) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f00000015c0)=0x4) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001500), 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000300)="dfeab7f3272e90039367882eb254f1731681aedc3cb769228e889ba61cf9e9ffd65ff6ff7b46f624ed4826469616331e7e4f3e38055f4aa09bbc25d68863db8ed9f7c9b2c76f84e2711bdaac81eddcfc2f9f56588e1c74e9d5bea6331aabed042f4d8c7c824a4d41494ff9146f51d360da7848e589ec3f26ce0132353afe37100d12cca936edf29891b9fe8cf4cbee71c1d7d9ebff93b47f67a7857651ee1eca49b752f38d75c42e1b3463d82d706807f8268457146ea2b0930fd63a0c221dc988259ee3e5ecd446b5996434861c529310cd9a2250833ff5c2a20e8aec8b7ef66aa1c1162b", 0xe5}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="da68c48645598976dfbddf684ec56a2dbef1d20ebd78808eb636a9ccc8e374d01efe0c3db8062a675a9acca6a105f399b1222b53bd2c9a90db102c9d1fca8a0dd1a29b1d70209872a7f75d9d41112b77bf182d7c9ebb2184e1381a0d9790e2b1b05a3973f156017b652709d0cf09b9e06fc1373fc4fd987f9ebc84fb1fbedcef3c1dfefe5480f644d9c0d370d44ce16b8a9a13ba2346ba7ae4b0ca649d5b70932a8052ec12a92d1ae70fc24814afbc9d75fbd4766f74720d661a83b9031540b80858a3131bf3309c95cab79a64fc8cc17762680925ee1968b6c4d13fd6b9d67c9a02662644e20ea080c03450970da4de5340f600eafccd9cae11bb69f8e325", 0xff}], 0x3, &(0x7f0000001540)=ANY=[@ANYBLOB="1400"/16, @ANYRES32=r2, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00'], 0x38, 0x4000000}, 0x40000) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:39 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080000000d000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:39 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf030000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:39 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:39 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf040000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 756.164532][T13656] loop0: detected capacity change from 0 to 1 [ 756.171015][T13657] loop5: detected capacity change from 0 to 224 [ 756.204750][T13665] loop4: detected capacity change from 0 to 224 07:35:39 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0xc) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x80000, 0x0) kcmp$KCMP_EPOLL_TFD(r2, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000300)={r1, r3}) getdents64(r1, &(0x7f0000000080)=""/47, 0x1f) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) finit_module(r1, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x1) 07:35:39 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bfb80200000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 756.222677][T13656] loop0: p1 p2 p3 p4 [ 756.227565][T13656] loop0: p1 start 10 is beyond EOD, truncated [ 756.234565][T13656] loop0: p2 start 851968 is beyond EOD, truncated [ 756.241206][T13656] loop0: p3 start 225 is beyond EOD, truncated [ 756.247361][T13656] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:39 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 756.289707][T13656] loop0: detected capacity change from 0 to 1 [ 756.298871][T13680] loop5: detected capacity change from 0 to 224 [ 756.329896][T13656] loop0: p1 p2 p3 p4 07:35:39 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf050000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:39 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x1000000000000, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) [ 756.334224][T13656] loop0: p1 start 10 is beyond EOD, truncated [ 756.340369][T13656] loop0: p2 start 851968 is beyond EOD, truncated [ 756.346791][T13656] loop0: p3 start 225 is beyond EOD, truncated [ 756.352979][T13656] loop0: p4 start 2415919104 is beyond EOD, truncated [ 756.358388][T13689] loop4: detected capacity change from 0 to 224 [ 756.410259][T13695] loop5: detected capacity change from 0 to 224 [ 756.410374][ T1039] loop0: p1 p2 p3 p4 [ 756.421355][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 756.427446][ T1039] loop0: p2 start 851968 is beyond EOD, truncated [ 756.434083][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 756.440301][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:40 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:40 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080000000e000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:40 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:40 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000300000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:40 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf060000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:40 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) lseek(r0, 0xfffffffffffffff8, 0x1) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f00000000c0)={0x1, 0x6}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x101020, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000040)="2af5af28cc2101eb36c0209c0d9960a5", 0x10) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000300)=""/90, 0x5a}, {&(0x7f0000000380)=""/86, 0x56}, {&(0x7f0000000400)=""/176, 0xb0}], 0x3, 0x2735, 0xa68) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:40 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000380)={[0xdc04]}, 0x8, 0x80000) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000400)={0x0, @adiantum, 0x0, @desc1}) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) bind$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x5, 0x0, 0x1, 0x83, 0x6, @random="000000000004"}, 0x14) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0xa00c0, 0x0) r3 = ioctl$TIOCGPTPEER(r0, 0x5441, 0xffffffffffffff15) lseek(r3, 0x400, 0x2) getdents64(r2, &(0x7f00000001c0)=""/267, 0x18) getdents64(r2, &(0x7f0000000080)=""/47, 0x2f) r4 = fcntl$dupfd(r2, 0x406, r1) ioctl$EVIOCSKEYCODE_V2(r4, 0x40284504, &(0x7f0000000300)={0xc6, 0xc, 0x9, 0x4, "04d2f9a0895b5ba4ca2dd1a6ff93816939128f9530740ec83e754c9989cef72b"}) open_tree(r2, &(0x7f00000003c0)='./file0\x00', 0x800) getdents64(r2, &(0x7f00000000c0)=""/64, 0x40) getdents(r2, &(0x7f0000000140)=""/87, 0x57) [ 757.095947][T13716] loop5: detected capacity change from 0 to 224 [ 757.127223][T13724] loop4: detected capacity change from 0 to 224 07:35:40 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf020400000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:40 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf070000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:40 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 757.157732][T13726] loop0: detected capacity change from 0 to 1 07:35:40 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000300)=""/152) [ 757.209800][T13726] loop0: p1 p2 p3 p4 [ 757.213881][T13726] loop0: p1 start 10 is beyond EOD, truncated [ 757.220105][T13726] loop0: p2 start 917504 is beyond EOD, truncated [ 757.226782][T13726] loop0: p3 start 225 is beyond EOD, truncated [ 757.233042][T13726] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:40 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf080000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 757.257085][T13750] loop5: detected capacity change from 0 to 224 [ 757.268829][T13749] loop4: detected capacity change from 0 to 224 [ 757.292717][T13726] loop0: detected capacity change from 0 to 1 [ 757.342609][T13726] loop0: p1 p2 p3 p4 [ 757.346705][T13726] loop0: p1 start 10 is beyond EOD, truncated [ 757.352805][T13726] loop0: p2 start 917504 is beyond EOD, truncated [ 757.359330][T13726] loop0: p3 start 225 is beyond EOD, truncated [ 757.365522][T13726] loop0: p4 start 2415919104 is beyond EOD, truncated [ 757.381430][T13767] loop5: detected capacity change from 0 to 224 [ 757.439547][ T1039] loop0: p1 p2 p3 p4 [ 757.443971][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 757.450263][ T1039] loop0: p2 start 917504 is beyond EOD, truncated [ 757.456778][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 757.463066][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:40 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:40 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf060400000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:40 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x18000, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000000c0)={0xfa, 0x3, 0x9, 0x3, "015bc43cdde7685e48035caf71b077fdcb701d27ee79edac5c13317405d1355d"}) 07:35:40 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:40 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080000000f000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:40 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf090000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0xfae016677fd3fbc8, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:41 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0a0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 758.020102][T13779] loop0: detected capacity change from 0 to 1 [ 758.027053][T13782] loop5: detected capacity change from 0 to 224 [ 758.050255][T13787] loop4: detected capacity change from 0 to 224 07:35:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000500000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:41 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 758.090739][T13779] loop0: p1 p2 p3 p4 [ 758.095028][T13779] loop0: p1 start 10 is beyond EOD, truncated [ 758.101164][T13779] loop0: p2 start 983040 is beyond EOD, truncated [ 758.107649][T13779] loop0: p3 start 225 is beyond EOD, truncated [ 758.113844][T13779] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x2]}, 0x8, 0x800) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000180)={0x80, 0x6, 0x7, 0x81, "6ae10576af2060ec178e13ea15bdd6932a90967ada1f46f5b3f4c61bef85a09f"}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480), 0x402002, 0x0) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000580)={0x2, 0xa8, &(0x7f00000004c0)="62f487451918a1cf80faba5acb7e384d014c2cce03afc2e476b2662d86368091aaabdbf12d5e2264345e3810f7c437e72284f1e5fe5bc3d90bd329c16818cf9f953919bfa0e9286746afbc7adca9a9e1133cfd964f915dca571d1c92a4b04ace6497ea158acb6ca414ac26bd5b36fd525b551e3b17fb988d8bee92ef8954aa6a598f37bb2344824018adf626a7c8f2f05a2bef843c7bdf506dcca028c0938245e35faa19fc75684c"}) r4 = fspick(r1, &(0x7f0000000400)='./file0\x00', 0x1) r5 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x9) sendfile(r4, r5, 0x0, 0x2) ioctl$FITRIM(r5, 0xc0185879, &(0x7f0000000440)={0x2, 0x7fff, 0x1689a2ac}) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000000c0)={0x9, 0xb, 0x3ff, 0x401, "c970a903b381c664a6187994d83f57124806013020debd73fbca0c4719a155a6"}) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:41 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0b0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 758.170409][T13812] loop5: detected capacity change from 0 to 224 [ 758.201474][T13809] loop4: detected capacity change from 0 to 224 [ 758.247236][T13826] loop5: detected capacity change from 0 to 224 07:35:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:41 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:41 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000010000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000000c0)={0x0, 0x1c, 0x1000, 0xff, "b56a484b96e72bae87998d08875c1c1efade26be86c6f245fd8353ee24635f16"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000300)={0x3, 0xfffffffffffffffa, @start={0x0, 0x1, "7f458dc383068ac28635d979a276e7b7f6cc9b6c04b59f3f0517de33971621ea48864085874534edb01153762a4e534dc3cf8d9ce57f2d41979077827f498b29a5d15c845dbed4fe28e74918f4f4d955271148e4cdb61b077ce8f70bc0185b7c4ff3ebbdcabab7210fb4c0e50f12f89885a2e2edfe8f41f267b9ec77fbfee4ef29c7be085bcd65a9828845a8636c6e06564e1c7e9f83c7fa48e42a54e77dbe8e375a50157460b7f04418fafa1f159d5969cc3d5d70309621eedb21c15017ef895032476825025eb87bec3974953e59a50f36949c38be58bec541a1a5fc7deb0fd7ef800baa4934f29dc9723462cae475f6ec9db62ddb205aa729a8f12f1f0d864e0e7a3e60202fd8bf59d5e82ed4c06101dd0fc7b7237dbde2a13bbdd035f7ce9ee69d4c699d9b8aa7d7b5bfe0105b6b1642e922d1332469064218cc39f6cfd0a4a4c906e67fb9e54820e541769aca6a13f9d742fb67105867a7bc0fe64caa7c9a99112ebc44b32db8625da966ad6295a35b155181234b8669f63bd1af90c25f53b42679d07aa975d87d5fc3f49501eec14c45f467827b86634bb9ae84a9e526d54268fbbe8378717537dc8d69a1b17e5dce13d167477dfa0da13c131014b55da4f4d9e6ad72cc5273ca4696db643d532d989633367bbb2a591377b121d84ff3bcc4bbeb95c47a5ed6ab8f7801b007709fdd5f9a9fe22844b1f8091535ec76d6b9320a4cbe941d60e10063fdf341c75202ddf8512939ebc3053301ba857ae121eb8a50c84c86c3e0ca9af00512298c848e7e6c561d1ce1e0e32b80d6b47aa437c362d5ba877018bdbf6fb5db62285238741805746a4eef78d3ec15e5b7929449b0a0bc5b498529978e41205f86ce03a148350616e45b84b9449796f5bf8797ab1be4e19d96b610fc97bc6c651f02dd862ee1510bf9febb400550ffdf0d80bfa6bf1ed1a3b33c81a46ead64aea25dff0c381e2635b1d98bf55a6d429da5c41d0072488cdd8c1f688daece864c2508ac3aff86e2d875ef64340c5f414295bf53671aeba1f1019c243eb39ebcdb1e8fdea641d9435a6f5cbfc34200ff76f5bf3f3fcbeff3d3fb57d36c5dabf3292bd245e0a2f68f7b7c55b50b3c03c1b315e3ca178449461e5388f266b03fa797f9df1ff05780278886a54489226c3fed82fd3863730e8917a0510f7ea95560e3a098ef9a2460190395a7cbbfe66861e4fb6faea147ef5766949927afd2a8d443b978f49627bf68747fc6430b39cafef0947e9ca188e58270b37fe62b90f95677061af3aeed0406b2d1bb20173fb088a65cefd2812bf7e7388bb2e40461eb92757ad7ebd2a09760cc0ac395e84b2bbc4bfb4dda99a6494ce27a65074358b816a94a0859c15c88990d00d7a5d184ea9f35dce86700ef26ffb2521e643db16c2236d797ad15b35fe008747c22888a6d4c408503b6b4e8", "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"}, [0x4, 0x4, 0xecd8586000, 0x100, 0xbb0d, 0x1f, 0xfffffffffffffff8, 0x0, 0x3f, 0x4, 0x100000000, 0x1f, 0xc6ce, 0x1, 0x7, 0x91, 0x3, 0x4, 0x7ff, 0xa8, 0x2, 0x4, 0x1, 0x9, 0x3, 0xc520, 0x7, 0x6, 0x8, 0x5, 0x657, 0x1, 0x800, 0x5, 0x1, 0x8, 0x7, 0x41c1, 0x6, 0xffffffffffffffe1, 0x6, 0x5, 0xfffffffffffffffd, 0x3, 0x0, 0x1, 0x3, 0x2, 0x2, 0x0, 0x7, 0x7ff, 0x9642, 0xffffffffffffff50, 0x9, 0x8, 0x400, 0x5, 0x7, 0x80000000, 0x57, 0x9, 0x9]}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000d40)={r3, "7710e6312b530f44047989f5e0a3c316"}) 07:35:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000600000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:41 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0c0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f00000000c0)={0x0, 0x6, 0x0, 0x24, "ed006200000000003ec13e20001485eb006544000000004f1f00"}) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x8, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000140)=""/87) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x18) getdents64(r2, &(0x7f0000000080)=""/47, 0x2f) 07:35:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf040600000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 758.923239][T13842] loop4: detected capacity change from 0 to 224 [ 758.929979][T13844] loop0: detected capacity change from 0 to 1 [ 758.935383][T13841] loop5: detected capacity change from 0 to 224 07:35:41 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0d0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f00000000c0)=[0x3, 0xffffffe0]) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) [ 758.981081][T13844] loop0: p1 p2 p3 p4 [ 758.985531][T13844] loop0: p1 start 10 is beyond EOD, truncated [ 758.991672][T13844] loop0: p2 start 1048576 is beyond EOD, truncated [ 758.998489][T13844] loop0: p3 start 225 is beyond EOD, truncated [ 759.004668][T13844] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat$incfs(r2, &(0x7f00000000c0)='.log\x00', 0x2000c0, 0x120) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x1, 'wg2\x00'}, 0x18) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getdents64(r2, &(0x7f0000000300)=""/148, 0x94) 07:35:42 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000011000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) [ 759.059492][T13844] loop0: detected capacity change from 0 to 1 [ 759.102032][T13875] loop4: detected capacity change from 0 to 224 [ 759.117953][T13879] loop5: detected capacity change from 0 to 224 [ 759.186430][T13891] loop0: detected capacity change from 0 to 1 [ 759.229592][T13891] loop0: p1 p2 p3 p4 [ 759.233834][T13891] loop0: p1 start 10 is beyond EOD, truncated [ 759.240382][T13891] loop0: p2 start 1114112 is beyond EOD, truncated [ 759.247113][T13891] loop0: p3 start 225 is beyond EOD, truncated [ 759.253367][T13891] loop0: p4 start 2415919104 is beyond EOD, truncated [ 759.299458][T13891] loop0: detected capacity change from 0 to 1 [ 759.341440][T13891] loop0: p1 p2 p3 p4 [ 759.345530][T13891] loop0: p1 start 10 is beyond EOD, truncated [ 759.351760][T13891] loop0: p2 start 1114112 is beyond EOD, truncated [ 759.358271][T13891] loop0: p3 start 225 is beyond EOD, truncated [ 759.364677][T13891] loop0: p4 start 2415919104 is beyond EOD, truncated [ 759.409492][ T1039] loop0: p1 p2 p3 p4 [ 759.413722][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 759.419825][ T1039] loop0: p2 start 1114112 is beyond EOD, truncated [ 759.426325][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 759.432500][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:42 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000700000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f00000000c0)) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x18) getdents64(r2, &(0x7f0000000080)=""/47, 0x2f) 07:35:42 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0e0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:42 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000012000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000180)=0x4) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x18) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x101000, 0x0) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r4, 0x8, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r4, 0x80189439, &(0x7f0000000080)) getdents64(r3, &(0x7f0000000140)=""/53, 0x35) 07:35:42 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0f0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000900000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:42 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 759.820955][T13908] loop0: detected capacity change from 0 to 1 [ 759.830811][T13912] loop5: detected capacity change from 0 to 224 [ 759.842103][T13915] loop4: detected capacity change from 0 to 224 [ 759.904306][T13908] loop0: p1 p2 p3 p4 [ 759.915490][T13908] loop0: p1 start 10 is beyond EOD, truncated [ 759.921614][T13908] loop0: p2 start 1179648 is beyond EOD, truncated [ 759.928154][T13908] loop0: p3 start 225 is beyond EOD, truncated [ 759.934330][T13908] loop0: p4 start 2415919104 is beyond EOD, truncated [ 759.944845][T13933] loop5: detected capacity change from 0 to 224 07:35:42 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf100000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:42 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000013000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) [ 759.972483][T13939] loop4: detected capacity change from 0 to 224 [ 760.054705][T13952] loop0: detected capacity change from 0 to 1 [ 760.065378][T13955] loop5: detected capacity change from 0 to 224 [ 760.103882][T13952] loop0: p1 p2 p3 p4 [ 760.108021][T13952] loop0: p1 start 10 is beyond EOD, truncated [ 760.114128][T13952] loop0: p2 start 1245184 is beyond EOD, truncated [ 760.120648][T13952] loop0: p3 start 225 is beyond EOD, truncated [ 760.126890][T13952] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:43 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000140)={0x51, 0xc59, 0xb1, {0x80, 0x2142}, {0x4, 0x7f}, @ramp={0x1, 0x9b0, {0x2a2, 0x1, 0x1afb, 0x6}}}) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x8, 0x0) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000300)=""/141) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f00000000c0)={0x3, 0x7, 0x5743, {0xfff, 0x2}, {0xcd15, 0x3}, @cond=[{0x5, 0xa1, 0x9, 0x8000, 0x8, 0x9a3}, {0xc30, 0xb51c, 0x5, 0x80, 0x6, 0x2}]}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x18) getdents64(r2, &(0x7f0000000080)=""/47, 0x2f) 07:35:43 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:43 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000a00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:43 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf110000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:43 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000020000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:43 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf120000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:43 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 760.690478][T13972] loop5: detected capacity change from 0 to 224 [ 760.712509][T13975] loop4: detected capacity change from 0 to 224 [ 760.722407][T13979] loop0: detected capacity change from 0 to 1 07:35:43 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) syz_io_uring_setup(0x15b4, &(0x7f0000000180), &(0x7f000029a000/0x2000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r4}, 0x0) syz_io_uring_setup(0x15b4, &(0x7f0000000180), &(0x7f000029a000/0x2000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) r7 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r7}, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(r2, r6, &(0x7f00000000c0)=@IORING_OP_CONNECT={0x10, 0x1, 0x0, r8, 0x80, &(0x7f0000000140)=@generic={0x8, "be16b62b25f85461230cf13b8361604466d2106f5ea7d52bdef943a40c49564345a432738fec4127e9e7a18c36130d10bd7fb370646e3a6310c9552875abaf2dfd66e2436889c6ce2fa7bb59f6dfdb28c07c1726418c1740c1317ba16b765f6a7a059edd3afd7abc32ed3cae64b1dfddb9c06221979f47a27322cd739061"}}, 0x5) 07:35:43 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000b00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 760.789530][T13979] loop0: p1 p2 p3 p4 [ 760.793800][T13979] loop0: p1 start 10 is beyond EOD, truncated [ 760.799948][T13979] loop0: p2 start 2097152 is beyond EOD, truncated [ 760.806986][T13979] loop0: p3 start 225 is beyond EOD, truncated [ 760.813217][T13979] loop0: p4 start 2415919104 is beyond EOD, truncated [ 760.825035][T13998] loop5: detected capacity change from 0 to 224 07:35:43 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:43 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf180000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 760.908102][T14010] loop4: detected capacity change from 0 to 224 [ 760.917020][T13979] loop0: detected capacity change from 0 to 1 [ 760.950986][T13979] loop0: p1 p2 p3 p4 [ 760.955701][T13979] loop0: p1 start 10 is beyond EOD, truncated [ 760.961857][T13979] loop0: p2 start 2097152 is beyond EOD, truncated [ 760.968653][T13979] loop0: p3 start 225 is beyond EOD, truncated [ 760.975271][T13979] loop0: p4 start 2415919104 is beyond EOD, truncated [ 760.976707][T14023] loop5: detected capacity change from 0 to 224 [ 761.071158][ T1039] loop0: p1 p2 p3 p4 [ 761.075456][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 761.081567][ T1039] loop0: p2 start 2097152 is beyond EOD, truncated [ 761.088241][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 761.094467][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:44 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000c00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:44 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x1434c2) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, &(0x7f0000000140)={0x4, 0x8, '\x00', 0x0, &(0x7f00000000c0)=[0x0]}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) getdents64(r1, &(0x7f0000000300)=""/231, 0xe7) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 07:35:44 executing program 3: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:44 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:44 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf190000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:44 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000022000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) [ 761.581360][T14041] loop0: detected capacity change from 0 to 1 [ 761.585514][T14044] loop5: detected capacity change from 0 to 224 [ 761.603748][T14045] loop4: detected capacity change from 0 to 224 07:35:44 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x27, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f00000000c0)={0x104, @time={0x9, 0x6}, 0x1, {0x9, 0x20}, 0x8, 0x1, 0xda}) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) r3 = openat$cgroup(r2, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(0x0, 0x4, &(0x7f0000000680)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x1000, r3, &(0x7f00000003c0)="e30c9afbfe47cafdad3bbb48cf390d9fd4c311311f88bd3605849d8e3a5bae2e711572e9023f7a64e363ab3d3d3575a8e80497f3b73a84b3d6593c4a51134e3e80e6fe556f4ab0a66f27a31ab4aad31b4a96c3179df602776635b8281cfd6c3fac180019d961457c9da46c763a77bd4344b183e99b52fbc2566f2bca15438dee3b6db97f9a5a0fb070687535eedf06345d1611e00ca4b891b017975bab7458a4d41c20f7bea65c55b8390f1d938c39a88b1f2a6e71f9c2310fb2a11cb12393f9d5682c", 0xc3, 0x0, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x6, r4, &(0x7f00000004c0)="34cc", 0x2, 0x6, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x2, 0x0, r1, &(0x7f0000000540)="2d5f65390f031ec55a6b001b40cf6fe176318df26827c3421c9fe718c77e577ecdfb8fb0661f97cc7dae7e061eddfef9f647511df3eae593326a24", 0x3b, 0x101}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0xa72783f0a1a63c46, 0x6, r1, &(0x7f00000005c0)="e801bd4fe82a13e8a1232bd92f2b10060018706c497b621d3d266c67b1a269d208d015d9b1bff39c7890f2064c0b6f040eab3acb878041431522158bd891517b2c99f0361f304580665285d4e3f9108a5fee410c81e17a588ddd8f63af056797dcc2d8605f0c77644594fda257a70becd983fafdfdb083e9", 0x78, 0x266b, 0x0, 0x3, r1}]) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) r5 = open(&(0x7f0000000280)='.\x00', 0x0, 0x137) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r6, 0xf50f, 0x0) fcntl$notify(r5, 0x8, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r5, 0xc0a85352, &(0x7f0000000300)={{0x3, 0x5}, 'port0\x00', 0x6, 0x1b1010, 0x8, 0xcf2f, 0x1, 0x10001800, 0x5, 0x0, 0x5, 0x20}) 07:35:44 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf220000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:44 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000d00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:44 executing program 1: syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x81000) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r1, 0x80489439, &(0x7f0000000140)) getdents64(0xffffffffffffff9c, &(0x7f0000000080)=""/36, 0x24) [ 761.630825][T14041] loop0: p1 p2 p3 p4 [ 761.634980][T14041] loop0: p1 start 10 is beyond EOD, truncated [ 761.641156][T14041] loop0: p2 start 2228224 is beyond EOD, truncated [ 761.647878][T14041] loop0: p3 start 225 is beyond EOD, truncated [ 761.654127][T14041] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:44 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:44 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f00000000c0)=""/60, 0x3c) 07:35:44 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000024000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:44 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x12000, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000140)={0x81, 0xa, 0x7ff, 0x0, "cf2ae36f08c997bb9922c7539196a44efe0bcdc735d2c013fc168f5264ff53c3"}) [ 761.781790][T14073] loop5: detected capacity change from 0 to 224 [ 761.793287][T14078] loop0: detected capacity change from 0 to 1 [ 761.806072][T14077] loop4: detected capacity change from 0 to 224 [ 761.859472][T14078] loop0: p1 p2 p3 p4 [ 761.865974][T14078] loop0: p1 start 10 is beyond EOD, truncated [ 761.872113][T14078] loop0: p2 start 2359296 is beyond EOD, truncated [ 761.878770][T14078] loop0: p3 start 225 is beyond EOD, truncated [ 761.885279][T14078] loop0: p4 start 2415919104 is beyond EOD, truncated [ 761.940639][T14078] loop0: detected capacity change from 0 to 1 [ 761.979451][T14078] loop0: p1 p2 p3 p4 [ 761.983608][T14078] loop0: p1 start 10 is beyond EOD, truncated [ 761.989712][T14078] loop0: p2 start 2359296 is beyond EOD, truncated [ 761.996307][T14078] loop0: p3 start 225 is beyond EOD, truncated [ 762.002508][T14078] loop0: p4 start 2415919104 is beyond EOD, truncated [ 762.009875][ T1039] loop0: p1 p2 p3 p4 [ 762.014092][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 762.020290][ T1039] loop0: p2 start 2359296 is beyond EOD, truncated [ 762.027454][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 762.033624][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:45 executing program 3: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:45 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000e00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:45 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf250000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:45 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/disk', 0x200, 0x140) mmap(&(0x7f000054d000/0x4000)=nil, 0x4000, 0x3, 0x8010, 0xffffffffffffffff, 0xd88b4000) preadv(r1, &(0x7f0000000440)=[{&(0x7f0000000380)=""/153, 0x99}], 0x1, 0x2, 0x77822725) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0xa, 0x0, 0x20, "ed005400000000003ec13e20000000eb00df00"}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x18) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r2, 0xf507, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x414002, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getdents64(r3, &(0x7f0000000080)=""/30, 0xfffffffffffffe59) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$LOOP_SET_CAPACITY(r4, 0x4c07) r5 = syz_open_dev$vcsn(&(0x7f0000000300), 0x0, 0x200) r6 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r6, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r6, &(0x7f0000000340)) lseek(r4, 0xf420, 0x2) 07:35:45 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:45 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000025000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:45 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf480000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:45 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000f00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:45 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000000c0)={0xa, 0x4e20, 0x9b2, @dev={0xfe, 0x80, '\x00', 0x2f}, 0x5}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000140)="3a55908469f3ef94f246a3671917d774617da8937639fc4b087d0f8fde36ae29c6b0f3a550f7a02fcc5f7234c48215f846d2", 0x32}, {&(0x7f0000000180)="fef22a8ccbf42959d6490aeac0fb1b83b19606ba5a910eaa47daa38bb8728714b4146e029a43c8a54974cdd045f22a3bece6aab67165cfefd276a0e625", 0x3d}], 0x2, &(0x7f0000000340)=[@rthdrdstopts={{0x78, 0x29, 0x37, {0x5fdab4d7a5482f12, 0xb, '\x00', [@padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x5, 0x48, "dcfda46083253aa949bd590302fd6bf178b49382f78a7b6b7b3b0db41e590812fa989de8a5a134297bf7658206fe27e13c6f8937d84fc83311652e3a8179f961f50fbdc2d62e45f0"}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x73}}, @dstopts_2292={{0x118, 0x29, 0x4, {0xc, 0x1f, '\x00', [@calipso={0x7, 0x28, {0x1, 0x8, 0x7f, 0xf410, [0x8, 0x5, 0xfffffffffffffffd, 0x6b71]}}, @generic={0x0, 0xbc, "f1673752fbdfd50266f3d1e39de4a847ef8fbb9f598484cf27459b854c5889b26c4f573ff7964fdfd85650d4a823b0a7e23474865e49fa6d8707329559ef66003538757195cac8c54de4084dc153412e7286b3678afc9de8abdc7d57f3a2987ea8d7b1af1fb76ff3fca8834b113f866e21b14629ab946ddd4d22d45b945d515cfd4f14708a80f0fc701a2c94dd3f4dc278c48041aa47c7401cc8f48d935292de27230bd3041796563ff935ee0c44316884bebb870bfb6db63b9f6ef9"}, @enc_lim={0x4, 0x1, 0x9}, @padn={0x1, 0x1, [0x0]}, @enc_lim, @ra={0x5, 0x2, 0x80}, @jumbo={0xc2, 0x4, 0x80}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x800}}], 0x1c0}, 0x400c070) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000540), 0x40a000, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000600)={0xa, 0x4e21, 0x9, @loopback, 0x2}, 0x1c, &(0x7f0000000840)=[{&(0x7f0000000640)="b806fc9ae9acc104f7daccd2f85c082af041ed2ef1bf605f34a7a933a04104d2e658139c5447a08dcb4dbfb62c972abd119eb01268c39032a70e7acca510b9b99ade2ee779540e6845b7c1819a88afa457c5b139bcfe8f4a2a752a5efcf46a9d041696421f02008d99d2307649af00cf91fea7e5e8dc7bd1e572157c835cdbadc0c803dc4367546078336744fb18c212808865042486238ca98b5748de26824b87f7fdbb0a01", 0xa6}, {&(0x7f0000000700)="5f49472c051fc9c6a8c3af4bb1565c52edb183260a8ede57ddf06ec46f0f3458de9bd91227c84d6e1f3c389674957e03b3d2dd72bc1e0ee7953851983b77ddef6b9c8ebfbc12ba2bcf6ad1617e4ec0c09cc17be6647fc16229", 0x59}, {&(0x7f0000000780)="5de0bf55de82185772816e6c558087c148850103f095363bf7f91a583f6eda7b743502fc0ec803191186831cb1f1aa6ed1b471ac081a6ef052a4c7d7195dc34904a437f6d3965e7b954d2842850b79c21f586e24d31110ee357b6b8a0435f188bcfdcf7633f46357346cae6b3efb27f7dcb20fda6f39591a1edab12dcc428c72488d56384db950e2d85cf985caf7c842d3a4cd30178188e9696396abaf832a1e7056c970ecd3b7df89253195d8a9b7173a8c0fbf569ad9", 0xb7}], 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="0400000032070000000000000452fa6eeb00c2040000e6d40001000323c43b43a0d867950519f1629479fcaed9dd5e5361c47fcaa76c3b670c2e9a9c3a4dd2a205020006"], 0x50}, 0x84) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000380)={0x3c, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_FEATURES_WANTED={0x1c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}]}]}, 0x3c}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000580)={@mcast2, @rand_addr=' \x01\x00', @private1, 0x2, 0x2, 0x4, 0x100, 0xffff, 0x40000, r6}) [ 762.492822][T14113] loop5: detected capacity change from 0 to 224 [ 762.497350][T14116] loop0: detected capacity change from 0 to 1 [ 762.514114][T14118] loop4: detected capacity change from 0 to 224 [ 762.564380][T14116] loop0: p1 p2 p3 p4 [ 762.570776][T14116] loop0: p1 start 10 is beyond EOD, truncated [ 762.576920][T14116] loop0: p2 start 2424832 is beyond EOD, truncated [ 762.583493][T14116] loop0: p3 start 225 is beyond EOD, truncated [ 762.589671][T14116] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:45 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:45 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf4c0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 762.617920][T14139] loop5: detected capacity change from 0 to 224 [ 762.678599][T14145] loop4: detected capacity change from 0 to 224 [ 762.701354][T14116] loop0: detected capacity change from 0 to 1 07:35:45 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf201000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 762.739771][T14153] loop5: detected capacity change from 0 to 224 [ 762.762799][T14116] loop0: p1 p2 p3 p4 [ 762.767104][T14116] loop0: p1 start 10 is beyond EOD, truncated [ 762.773219][T14116] loop0: p2 start 2424832 is beyond EOD, truncated [ 762.779751][T14116] loop0: p3 start 225 is beyond EOD, truncated [ 762.786454][T14116] loop0: p4 start 2415919104 is beyond EOD, truncated [ 762.809705][ T1039] loop0: p1 p2 p3 p4 [ 762.814873][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 762.821257][ T1039] loop0: p2 start 2424832 is beyond EOD, truncated [ 762.827752][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 762.829751][T14164] loop4: detected capacity change from 0 to 224 [ 762.833936][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:46 executing program 3: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:46 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf680000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:46 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:46 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000026000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf001100000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:46 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x240, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r3, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r4 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r3, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000004ac0)=""/102389, 0x18ff5}]}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r4], 0xc63b9e35) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="b4010000", @ANYRES16=r4, @ANYBLOB="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"/430], 0x1b4}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf001200000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:46 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf6c0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:46 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 763.400779][T14182] loop5: detected capacity change from 0 to 224 [ 763.407805][T14184] loop4: detected capacity change from 0 to 224 [ 763.425975][T14188] loop0: detected capacity change from 0 to 1 [ 763.496629][T14188] loop0: p1 p2 p3 p4 [ 763.505953][T14188] loop0: p1 start 10 is beyond EOD, truncated [ 763.512059][T14188] loop0: p2 start 2490368 is beyond EOD, truncated [ 763.513303][T14206] loop4: detected capacity change from 0 to 224 [ 763.518686][T14188] loop0: p3 start 225 is beyond EOD, truncated [ 763.518703][T14188] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf001800000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:46 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf740000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 763.568954][T14212] loop5: detected capacity change from 0 to 224 [ 763.583195][T14188] loop0: detected capacity change from 0 to 1 07:35:46 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) [ 763.640083][T14220] loop5: detected capacity change from 0 to 224 [ 763.648945][T14188] loop0: p1 p2 p3 p4 [ 763.665385][T14188] loop0: p1 start 10 is beyond EOD, truncated [ 763.668333][T14228] loop4: detected capacity change from 0 to 224 [ 763.671630][T14188] loop0: p2 start 2490368 is beyond EOD, truncated [ 763.684715][T14188] loop0: p3 start 225 is beyond EOD, truncated [ 763.690885][T14188] loop0: p4 start 2415919104 is beyond EOD, truncated [ 763.729503][ T1039] loop0: p1 p2 p3 p4 [ 763.733971][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 763.740550][ T1039] loop0: p2 start 2490368 is beyond EOD, truncated [ 763.747041][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 763.753300][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:47 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:47 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf7a0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:47 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf001900000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:47 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080000002e000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:47 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x2, 0x0) 07:35:47 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f0000000180)={&(0x7f0000000300)=""/4096, 0x1000}) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f00000000c0)={0x0, 0x3f, [0x6, 0x4, 0x7, 0x1, 0x100000000, 0xfc00000000000000]}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/261, 0x105) getdents64(r2, &(0x7f0000000080)=""/47, 0x2f) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/devices/uprobe', 0x4000, 0x80) 07:35:47 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf102000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 764.284211][T14249] loop0: detected capacity change from 0 to 1 [ 764.295132][T14251] loop4: detected capacity change from 0 to 224 [ 764.296389][T14256] loop5: detected capacity change from 0 to 224 07:35:47 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bffe0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:47 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, 0x0, 0x0, 0x2, 0x0) [ 764.331372][T14249] loop0: p1 p2 p3 p4 [ 764.335602][T14249] loop0: p1 start 10 is beyond EOD, truncated [ 764.341739][T14249] loop0: p2 start 3014656 is beyond EOD, truncated [ 764.348256][T14249] loop0: p3 start 225 is beyond EOD, truncated [ 764.354425][T14249] loop0: p4 start 2415919104 is beyond EOD, truncated [ 764.399714][T14275] loop4: detected capacity change from 0 to 224 [ 764.406534][T14276] loop5: detected capacity change from 0 to 224 07:35:47 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf580100000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:47 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf002200000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 764.489960][T14249] loop0: detected capacity change from 0 to 1 [ 764.529599][T14249] loop0: p1 p2 p3 p4 [ 764.533330][T14292] loop4: detected capacity change from 0 to 224 [ 764.533918][T14249] loop0: p1 start 10 is beyond EOD, truncated [ 764.546132][T14249] loop0: p2 start 3014656 is beyond EOD, truncated [ 764.552705][T14249] loop0: p3 start 225 is beyond EOD, truncated [ 764.558943][T14249] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:47 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf002500000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 764.585316][T14296] loop5: detected capacity change from 0 to 224 [ 764.657400][T14301] loop4: detected capacity change from 0 to 224 07:35:48 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:48 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, 0x0, 0x0, 0x2, 0x0) 07:35:48 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080000003e000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:48 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf610100000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf003f00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf004000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 765.149242][T14317] loop0: detected capacity change from 0 to 1 [ 765.155303][T14319] loop4: detected capacity change from 0 to 224 [ 765.156207][T14320] loop5: detected capacity change from 0 to 224 07:35:48 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf860100000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:48 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, 0x0, 0x0, 0x2, 0x0) [ 765.209504][T14317] loop0: p1 p2 p3 p4 [ 765.216567][T14317] loop0: p1 start 10 is beyond EOD, truncated [ 765.222702][T14317] loop0: p2 start 4063232 is beyond EOD, truncated [ 765.229338][T14317] loop0: p3 start 225 is beyond EOD, truncated [ 765.235536][T14317] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:48 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200), 0x0, 0x2, 0x0) [ 765.289394][T14317] loop0: detected capacity change from 0 to 1 [ 765.307176][T14340] loop4: detected capacity change from 0 to 224 [ 765.318799][T14341] loop5: detected capacity change from 0 to 224 [ 765.332674][T14317] loop0: p1 p2 p3 p4 07:35:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf004800000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:48 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf870100000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:48 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080000003f000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) [ 765.356472][T14317] loop0: p1 start 10 is beyond EOD, truncated [ 765.362606][T14317] loop0: p2 start 4063232 is beyond EOD, truncated [ 765.369396][T14317] loop0: p3 start 225 is beyond EOD, truncated [ 765.375666][T14317] loop0: p4 start 2415919104 is beyond EOD, truncated [ 765.429474][T14358] loop5: detected capacity change from 0 to 224 [ 765.441693][T14363] loop4: detected capacity change from 0 to 224 [ 765.513490][T14370] loop0: detected capacity change from 0 to 1 [ 765.572087][T14370] loop0: p1 p2 p3 p4 [ 765.577015][T14370] loop0: p1 start 10 is beyond EOD, truncated [ 765.583211][T14370] loop0: p2 start 4128768 is beyond EOD, truncated [ 765.590002][T14370] loop0: p3 start 225 is beyond EOD, truncated [ 765.596158][T14370] loop0: p4 start 2415919104 is beyond EOD, truncated [ 765.677397][T14370] loop0: detected capacity change from 0 to 1 [ 765.723460][T14370] loop0: p1 p2 p3 p4 [ 765.727689][T14370] loop0: p1 start 10 is beyond EOD, truncated [ 765.733995][T14370] loop0: p2 start 4128768 is beyond EOD, truncated [ 765.740549][T14370] loop0: p3 start 225 is beyond EOD, truncated [ 765.746883][T14370] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:48 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:48 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200), 0x0, 0x2, 0x0) 07:35:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf004c00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:48 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf040200000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:48 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000040000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:49 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf780200000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 766.035940][T14397] loop5: detected capacity change from 0 to 224 [ 766.043282][T14395] loop4: detected capacity change from 0 to 224 [ 766.044454][T14399] loop0: detected capacity change from 0 to 1 07:35:49 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf006800000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:49 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200), 0x0, 0x2, 0x0) [ 766.102773][T14399] loop0: p1 p2 p3 p4 [ 766.112089][T14399] loop0: p1 start 10 is beyond EOD, truncated [ 766.118185][T14399] loop0: p2 start 4194304 is beyond EOD, truncated [ 766.124781][T14399] loop0: p3 start 225 is beyond EOD, truncated [ 766.130952][T14399] loop0: p4 start 2415919104 is beyond EOD, truncated [ 766.136587][T14414] loop5: detected capacity change from 0 to 224 07:35:49 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf790200000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:49 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf006c00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 766.168815][T14420] loop4: detected capacity change from 0 to 224 [ 766.170545][T14399] loop0: detected capacity change from 0 to 1 07:35:49 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf9e0200000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 766.233025][T14399] loop0: p1 p2 p3 p4 [ 766.237180][T14399] loop0: p1 start 10 is beyond EOD, truncated [ 766.243396][T14399] loop0: p2 start 4194304 is beyond EOD, truncated [ 766.249345][T14432] loop5: detected capacity change from 0 to 224 [ 766.249942][T14399] loop0: p3 start 225 is beyond EOD, truncated [ 766.262440][T14399] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:49 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800080040000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) [ 766.317902][T14440] loop4: detected capacity change from 0 to 224 [ 766.348007][T14445] loop5: detected capacity change from 0 to 224 [ 766.354763][ T1039] loop0: p1 p2 p3 p4 [ 766.358859][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 766.364985][ T1039] loop0: p2 start 4194304 is beyond EOD, truncated [ 766.371542][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 766.377732][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated [ 766.428600][T14449] loop0: detected capacity change from 0 to 1 [ 766.471855][T14449] loop0: p1 p2 p3 p4 [ 766.476360][T14449] loop0: p1 start 10 is beyond EOD, truncated [ 766.482562][T14449] loop0: p2 start 4194312 is beyond EOD, truncated [ 766.489066][T14449] loop0: p3 start 225 is beyond EOD, truncated [ 766.495245][T14449] loop0: p4 start 2415919104 is beyond EOD, truncated [ 766.555335][T14449] loop0: detected capacity change from 0 to 1 [ 766.609415][T14449] loop0: p1 p2 p3 p4 [ 766.613795][T14449] loop0: p1 start 10 is beyond EOD, truncated [ 766.619900][T14449] loop0: p2 start 4194312 is beyond EOD, truncated [ 766.626399][T14449] loop0: p3 start 225 is beyond EOD, truncated [ 766.632616][T14449] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:49 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:49 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf007400000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:49 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bfa60200000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:49 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000048000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:49 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{0x0}], 0x1, 0x2, 0x0) 07:35:49 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf027800000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:49 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000300000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 766.936728][T14469] loop0: detected capacity change from 0 to 1 [ 766.942333][T14472] loop5: detected capacity change from 0 to 224 [ 766.950740][T14470] loop4: detected capacity change from 0 to 224 [ 767.016208][T14469] loop0: p1 p2 p3 p4 [ 767.022925][T14469] loop0: p1 start 10 is beyond EOD, truncated [ 767.029235][T14469] loop0: p2 start 4718592 is beyond EOD, truncated [ 767.035791][T14469] loop0: p3 start 225 is beyond EOD, truncated [ 767.042010][T14469] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf007a00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 767.064539][T14489] loop4: detected capacity change from 0 to 224 07:35:50 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{0x0}], 0x1, 0x2, 0x0) 07:35:50 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf020400000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 767.099148][T14493] loop5: detected capacity change from 0 to 224 [ 767.113565][T14469] loop0: detected capacity change from 0 to 1 [ 767.136590][T14495] loop4: detected capacity change from 0 to 224 07:35:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf02a600000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 767.182132][T14469] loop0: p1 p2 p3 p4 [ 767.186397][T14469] loop0: p1 start 10 is beyond EOD, truncated [ 767.192520][T14469] loop0: p2 start 4718592 is beyond EOD, truncated [ 767.199050][T14469] loop0: p3 start 225 is beyond EOD, truncated [ 767.205235][T14469] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:50 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{0x0}], 0x1, 0x2, 0x0) [ 767.232551][T14513] loop5: detected capacity change from 0 to 224 [ 767.258635][T14518] loop4: detected capacity change from 0 to 224 07:35:50 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:50 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf060400000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf02a700000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:50 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080000004c000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:50 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:35:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf02b800000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:50 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000500000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 767.793410][T14536] loop4: detected capacity change from 0 to 224 [ 767.804378][T14539] loop5: detected capacity change from 0 to 224 [ 767.816227][T14541] loop0: detected capacity change from 0 to 1 [ 767.891450][T14541] loop0: p1 p2 p3 p4 [ 767.899962][T14541] loop0: p1 start 10 is beyond EOD, truncated [ 767.906141][T14541] loop0: p2 start 4980736 is beyond EOD, truncated [ 767.912695][T14541] loop0: p3 start 225 is beyond EOD, truncated [ 767.918871][T14541] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:50 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 767.937943][T14558] loop5: detected capacity change from 0 to 224 [ 767.941138][T14562] loop4: detected capacity change from 0 to 224 07:35:50 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000600000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bfc0ed00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:50 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000060000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bffffe00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 768.101083][T14579] loop4: detected capacity change from 0 to 224 [ 768.107714][T14581] loop0: detected capacity change from 0 to 1 [ 768.108649][T14580] loop5: detected capacity change from 0 to 224 [ 768.164531][T14581] loop0: p1 p2 p3 p4 [ 768.168766][T14581] loop0: p1 start 10 is beyond EOD, truncated [ 768.175078][T14581] loop0: p2 start 6291456 is beyond EOD, truncated [ 768.181627][T14581] loop0: p3 start 225 is beyond EOD, truncated [ 768.187820][T14581] loop0: p4 start 2415919104 is beyond EOD, truncated [ 768.235303][T14594] loop4: detected capacity change from 0 to 224 [ 768.276543][T14581] loop0: detected capacity change from 0 to 1 [ 768.343046][T14581] loop0: p1 p2 p3 p4 [ 768.347309][T14581] loop0: p1 start 10 is beyond EOD, truncated [ 768.353438][T14581] loop0: p2 start 6291456 is beyond EOD, truncated [ 768.359968][T14581] loop0: p3 start 225 is beyond EOD, truncated [ 768.366318][T14581] loop0: p4 start 2415919104 is beyond EOD, truncated [ 768.390139][ T1039] loop0: p1 p2 p3 p4 [ 768.394271][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 768.400369][ T1039] loop0: p2 start 6291456 is beyond EOD, truncated [ 768.406934][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 768.413140][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:51 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:51 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf040600000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:51 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:35:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0fff00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:51 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000068000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:51 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r4}, {}, {r3}, {r3}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {r2, r4}, {0x0, r4}, {}, {r3, r4}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {}, {r2}, {0x0, r4}, {}, {}, {r2, r4}, {r3}, {}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r2, r4}, {}, {0x0, r4}, {r3}, {}, {}, {r3}, {0x0, r4}, {}, {0x0, r4}, {}, {r2, r4}, {0x0, r4}, {r2}, {}, {r3}, {r2}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {0x0, r4}, {r3, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {r2, r4}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {r3, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {0x0, r4}, {}, {0x0, r4}, {r2, r4}, {0x0, r4}, {r3, r4}, {r2, r4}, {r3}, {}, {r2, r4}, {r2}, {0x0, r4}, {}, {r2}, {0x0, r4}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r2, r4}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {}, {}, {r3}, {}, {}, {0x0, r4}, {r2}, {}, {r3}, {}, {0x0, r4}, {r3}, {0x0, r4}, {0x0, r4}, {}, {0x0, r4}, {}, {0x0, r4}, {}, {r2}, {}, {}, {}, {0x0, r4}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {r3}, {}, {}, {}, {r2}, {r2}, {0x0, r4}, {r2}, {r3, r4}, {0x0, r4}, {r2}, {}, {r2}, {0x0, r4}, {r3}, {r2, r4}, {0x0, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {r3}, {r2}, {}, {r2}, {}, {0x0, r4}, {r3, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3, r4}, {r2}, {r3}, {r3, r4}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {r3}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {r3}, {0x0, r4}, {}, {r2, r4}, {r2}, {}, {}, {0x0, r4}, {}, {r3, r4}, {r2}, {0x0, r4}, {}, {}, {r2, r4}, {r3, r4}, {r3}, {r2, r4}, {}, {}, {r3}, {r2, r4}, {0x0, r4}, {}, {0x0, r4}, {r3}, {r3}, {r2}, {}, {r3, r4}, {r3}, {0x0, r4}, {}, {}, {}, {r2, r4}], 0x1, "2156816c73038c"}) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r9}, {}, {r8}, {r8}, {r8}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {r7, r9}, {0x0, r9}, {}, {r8, r9}, {0x0, r9}, {}, {}, {}, {0x0, r9}, {}, {0x0, r9}, {0x0, r9}, {r8}, {0x0, r9}, {}, {}, {r7}, {0x0, r9}, {}, {}, {r7, r9}, {r8}, {}, {0x0, r9}, {r8, r9}, {0x0, r9}, {r7, r9}, {}, {0x0, r9}, {r8}, {}, {}, {r8}, {0x0, r9}, {}, {0x0, r9}, {}, {r7, r9}, {0x0, r9}, {r7}, {}, {r8}, {r7}, {}, {r8, r9}, {}, {0x0, r9}, {0x0, r9}, {}, {0x0, r9}, {r8, r9}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {r8}, {0x0, r9}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {0x0, r9}, {r7}, {0x0, r9}, {}, {}, {r7, r9}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {r8}, {0x0, r9}, {0x0, r9}, {r7}, {r8, r9}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {}, {0x0, r9}, {r7}, {0x0, r9}, {}, {0x0, r9}, {r7, r9}, {0x0, r9}, {r8, r9}, {r7, r9}, {r8}, {}, {r7, r9}, {r7}, {0x0, r9}, {}, {r7}, {0x0, r9}, {}, {}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {}, {}, {r7, r9}, {0x0, r9}, {r8, r9}, {r7, r9}, {0x0, r9}, {}, {}, {r8}, {}, {}, {0x0, r9}, {r7}, {}, {r8}, {}, {0x0, r9}, {r8}, {0x0, r9}, {0x0, r9}, {}, {0x0, r9}, {}, {0x0, r9}, {}, {r7}, {}, {}, {}, {0x0, r9}, {r7, r9}, {r8}, {}, {0x0, r9}, {}, {r8}, {}, {}, {}, {r7}, {r7}, {0x0, r9}, {r7}, {r8, r9}, {0x0, r9}, {r7}, {}, {r7}, {0x0, r9}, {r8}, {r7, r9}, {0x0, r9}, {}, {0x0, r9}, {}, {}, {0x0, r9}, {r8}, {r7}, {}, {r7}, {}, {0x0, r9}, {r8, r9}, {0x0, r9}, {0x0, r9}, {}, {}, {r8, r9}, {r7}, {r8}, {r8, r9}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {r8}, {0x0, r9}, {r7}, {r8}, {r8}, {}, {}, {r8}, {0x0, r9}, {}, {r7, r9}, {r7}, {}, {}, {0x0, r9}, {}, {r8, r9}, {r7}, {0x0, r9}, {}, {}, {r7, r9}, {r8, r9}, {r8}, {r7, r9}, {}, {}, {r8}, {r7, r9}, {0x0, r9}, {}, {0x0, r9}, {r8}, {r8}, {r7}, {}, {r8, r9}, {r8}, {0x0, r9}, {}, {}, {}, {r7, r9}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055300)={0x8f4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x0, "0d4abfd4b32220"}) r10 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r10, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r10, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r11, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r14}, {}, {r13}, {r13}, {r13}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {r12, r14}, {0x0, r14}, {}, {r13, r14}, {0x0, r14}, {}, {}, {}, {0x0, r14}, {}, {0x0, r14}, {0x0, r14}, {r13}, {0x0, r14}, {}, {}, {r12}, {0x0, r14}, {}, {}, {r12, r14}, {r13}, {}, {0x0, r14}, {r13, r14}, {0x0, r14}, {r12, r14}, {}, {0x0, r14}, {r13}, {}, {}, {r13}, {0x0, r14}, {}, {0x0, r14}, {}, {r12, r14}, {0x0, r14}, {r12}, {}, {r13}, {r12}, {}, {r13, r14}, {}, {0x0, r14}, {0x0, r14}, {}, {0x0, r14}, {r13, r14}, {0x0, r14}, {0x0, r14}, {0x0, r14}, {r13}, {0x0, r14}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {0x0, r14}, {r12}, {0x0, r14}, {}, {}, {r12, r14}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {r13}, {0x0, r14}, {0x0, r14}, {r12}, {r13, r14}, {0x0, r14}, {0x0, r14}, {0x0, r14}, {}, {0x0, r14}, {r12}, {0x0, r14}, {}, {0x0, r14}, {r12, r14}, {0x0, r14}, {r13, r14}, {r12, r14}, {r13}, {}, {r12, r14}, {r12}, {0x0, r14}, {}, {r12}, {0x0, r14}, {}, {}, {0x0, r14}, {0x0, r14}, {0x0, r14}, {0x0, r14}, {}, {}, {r12, r14}, {0x0, r14}, {r13, r14}, {r12, r14}, {0x0, r14}, {}, {}, {r13}, {}, {}, {0x0, r14}, {r12}, {}, {r13}, {}, {0x0, r14}, {r13}, {0x0, r14}, {0x0, r14}, {}, {0x0, r14}, {}, {0x0, r14}, {}, {r12}, {}, {}, {}, {0x0, r14}, {r12, r14}, {r13}, {}, {0x0, r14}, {}, {r13}, {}, {}, {}, {r12}, {r12}, {0x0, r14}, {r12}, {r13, r14}, {0x0, r14}, {r12}, {}, {r12}, {0x0, r14}, {r13}, {r12, r14}, {0x0, r14}, {}, {0x0, r14}, {}, {}, {0x0, r14}, {r13}, {r12}, {}, {r12}, {}, {0x0, r14}, {r13, r14}, {0x0, r14}, {0x0, r14}, {}, {}, {r13, r14}, {r12}, {r13}, {r13, r14}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {r13}, {0x0, r14}, {r12}, {r13}, {r13}, {}, {}, {r13}, {0x0, r14}, {}, {r12, r14}, {r12}, {}, {}, {0x0, r14}, {}, {r13, r14}, {r12}, {0x0, r14}, {}, {}, {r12, r14}, {r13, r14}, {r13}, {r12, r14}, {}, {}, {r13}, {r12, r14}, {0x0, r14}, {}, {0x0, r14}, {r13}, {r13}, {r12}, {}, {r13, r14}, {r13}, {0x0, r14}, {}, {}, {}, {r12, r14}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055300)={0x8f4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}], 0x0, "0d4abfd4b32220"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005d180)={0xa69, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {r7}, {r12}], 0x38, "537a7ea8d446ef"}) 07:35:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bffeff00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:51 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000700000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:51 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x8, 0x0) getdents(r2, &(0x7f0000000300)=""/144, 0x90) [ 768.676586][T14615] loop4: detected capacity change from 0 to 224 [ 768.691918][T14618] loop0: detected capacity change from 0 to 1 [ 768.711688][T14620] loop5: detected capacity change from 0 to 224 [ 768.749454][T14618] loop0: p1 p2 p3 p4 [ 768.753864][T14618] loop0: p1 start 10 is beyond EOD, truncated [ 768.759971][T14618] loop0: p2 start 6815744 is beyond EOD, truncated [ 768.766532][T14618] loop0: p3 start 225 is beyond EOD, truncated [ 768.772708][T14618] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:51 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:35:51 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x80002) r1 = syz_open_dev$vcsu(&(0x7f00000000c0), 0xf7, 0x240) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0xfff7, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000300)={0xffff, 0x7fff, 0x20, 0xeb, 0x3, 0x4}) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000140)=""/76) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x18) getdents64(r2, &(0x7f0000000080)=""/47, 0x2f) [ 768.808131][T14640] loop4: detected capacity change from 0 to 224 [ 768.824200][T14643] loop5: detected capacity change from 0 to 224 07:35:51 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000900000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 768.850884][T14618] loop0: detected capacity change from 0 to 1 [ 768.897054][T14618] loop0: p1 p2 p3 p4 [ 768.907741][T14618] loop0: p1 start 10 is beyond EOD, truncated [ 768.914129][T14618] loop0: p2 start 6815744 is beyond EOD, truncated [ 768.920677][T14618] loop0: p3 start 225 is beyond EOD, truncated [ 768.926833][T14618] loop0: p4 start 2415919104 is beyond EOD, truncated [ 768.941372][T14661] loop5: detected capacity change from 0 to 224 07:35:52 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000004000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:52 executing program 1: bind$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000300)=[{{r2, r3/1000+10000}, 0x12, 0x2c89, 0x55f5e95a}, {{0x0, 0x2710}, 0x16, 0x0, 0x9}], 0x30) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r4, &(0x7f00000001c0)=""/267, 0x18) getdents64(r4, &(0x7f0000000080)=""/47, 0x2f) 07:35:52 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:35:52 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080000006c000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:52 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000a00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:52 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000b00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 769.575998][T14679] loop5: detected capacity change from 0 to 224 [ 769.580740][T14680] loop0: detected capacity change from 0 to 1 [ 769.604005][T14683] loop4: detected capacity change from 0 to 224 07:35:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000008000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:52 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000c00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 769.649946][T14680] loop0: p1 p2 p3 p4 [ 769.654455][T14680] loop0: p1 start 10 is beyond EOD, truncated [ 769.660575][T14680] loop0: p2 start 7077888 is beyond EOD, truncated [ 769.667111][T14680] loop0: p3 start 225 is beyond EOD, truncated [ 769.673753][T14680] loop0: p4 start 2415919104 is beyond EOD, truncated [ 769.687784][T14702] loop5: detected capacity change from 0 to 224 [ 769.729810][T14680] loop0: detected capacity change from 0 to 1 [ 769.757936][T14712] loop4: detected capacity change from 0 to 224 07:35:52 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 769.785196][T14714] loop5: detected capacity change from 0 to 224 [ 769.792031][T14680] loop0: p1 p2 p3 p4 [ 769.811628][T14680] loop0: p1 start 10 is beyond EOD, truncated [ 769.817774][T14680] loop0: p2 start 7077888 is beyond EOD, truncated [ 769.824587][T14680] loop0: p3 start 225 is beyond EOD, truncated 07:35:52 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x8, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r6) newfstatat(0xffffffffffffff9c, &(0x7f0000008b80)='./file0\x00', &(0x7f0000008bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) r9 = accept4(r1, &(0x7f0000009240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f00000092c0)=0x80, 0x0) r11 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r11, 0x0) preadv(r11, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000009380)=[{{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000300)="242f8eaec56050fe7cb59379e3e404d141136b5293b14f465be570398a2d5b8a31f0fd33692194b686bd057c59fa21374c8027c240369955046f800f33df090a85ff1883b1c16f86e9798d3a37bd9b7309f8d777e90915d488a341afdb0a8d1a705a059a8416103d38edfab14f491d8f56bbefcb255fa18902672d2a0d4b2d91841745e60bc9a86be2208c7c5a841aa82fff56310d470e4d15845b38706be9ea60f35c1fca378733c89ead694ed37e955013ce95b3f2dd6a0acdd95ce609c2efc8b8ec15d71ed12aa047f03ed9bd65ec3ac56ca28241082715721d93f7925fec139516b369528af8f3ab7ebdaeefea68bacbe5166930", 0xf6}, {&(0x7f0000000400)="5cda971aa71c281423e5c66abae04ffbf50d9fe87638970ea46790425e85b5965a9b964242d18646e6c4816c08f0b170602ca84ff215b8efd0e264c905ef79838e188f7abefdee54475211649b39660d0e7475c461807ad1ba13530285a04439882b6785cbdc3ad8344269d14d254d01a2427c2e04b68e0ff5b393a359eb23490e9df6cc6f130209db88fd5bff432f1ff0126b92acd3e9db42c481fa61e93b458540c5506240512847a70d4f09615adb6c62871993bda00e6b68614a13dccc24af78", 0xc2}, {&(0x7f0000001d00)="6d2cdccabf7c3b1aa89856dac0ff43d1ab6a57166ecbf1bc7e5067f77b858cc85c99577a6900400318d57ce15b67073e350de854d06baffc6ed2bce1e07afadcdecd30af0819d8779e2ed3a27a93c46987eda7eb251b389e10fbbd2cc06c4f2803084c103fcc2d8638507870e4678b397a60cd3cc4f517d3a6abb08260dd40a48675ff92200c06559b63c208fb00ff4dd6d8643a628ea2cf5897256b5056e1a758a4a9602caad1bfdb4c770374b98d15a8d642b76e5834e8a1bd4bcc0ca42f37712e003a605af3cbb9fc8772deab40af3abf5d23b5e49b5af8f3300470dad92dc0711658c97a6e9e2301c3391903b2130eca3e75b69386db944d61257f54143c0b3a76d2a7678066103bc74c0ec425d099d10820ef34676bf46d6b8fca5c48405bdbeab74e1d871214752708a7bdf32da0f03caac4ce7d92ab6da0ac812d3f902f85b89577e4d1b69d16a89cc8", 0x14d}], 0x3, 0x0, 0x0, 0x840}}, {{&(0x7f00000005c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000640)="9dc833f554489fa000454a9bb659e8f4c5754269e7d2b4d2bf7782ebd64a4900bf901664dde9fd1c1c3e91a6ae2efa14", 0x30}, {&(0x7f0000000680)="5a5114b91e61c8c1e745c4e8cc96e5dc72346dbf4399d94f19cb8c65efa44e3f6ea59a9f38e9b976d7277f674eac92d3d7a9aedcd6a271cbec03356f3e7a313ec569d6870139ba837b0322cfaf762eedb949d8fe8964ffe23a8ef68b8e8f6be23ab18eeedb64f5f603fc35839962ee91312b1ebf2dd3c4", 0x77}, {&(0x7f0000000700)="630e8798d1ddc4725478bb81a406bd0f657c67774771f886372005af58f4f300785d48e4", 0x24}, {&(0x7f0000000740)="1f538d320b38cd193e664811f1ab363a081b77946443511d10e30412c4f3de0cd204e15e1a2bbfbf427eb96172f122a4b19300f9df05b5eedcfaa7d54102646d5c62571416c4a7ca158813fb47c8fbe3ae215adf3945425f25ae7e8c6990de3bb1de8b40994a424835be23aea7aa46627e9a2357152d37d5ea4e9f70c9f1e420a2545d", 0x83}, {&(0x7f0000001cc0)="862202a6cf2a719eb029aaeb1fe0fd3a1bb62850c70e5cfb9b3531851b3f5ebb04898c11a1d89fc4451a92", 0x2b}], 0x5, &(0x7f00000008c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r6, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x70, 0x20004015}}, {{&(0x7f0000000940)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001c40)=[{&(0x7f00000009c0)="79368cd076ae57b29e9fc78e7850a13c69a7ad2476c80de10c41ed79d38c0839ea0536967aab49ee239d358aa218df71e70d0628c60a2ce3c5826376b38c4dfc7eecb6dee68c0d5d2f13", 0x4a}, {&(0x7f0000000a40)="1a6555ba96f8b5fdbe859a0dd007910c66a310a37c5d4c2d2d43ba5e118e0ef0d53824d284d41741795af092795d5745b4f4a8811a9a32f30cf3050b7a8ca873645037276b5e281adcc457994880f1538791a627957d9b743f1253ef354ab95b", 0x60}, {&(0x7f0000000ac0)="fafb1eb8a06f9e7061b4b07cc6f159dc06d423007ddf36f5cce6a017890ab6cce928803474bca0803819e1d5919736986845b37ac4513abb7e0fbe7797fe7e7c865a966113ed0ab861d1a39326d8d63b8d3493584271d25c314e423860912182a1461238d000295ad34ffaf0ddc7de5d6afea65111c24602604b19029c2b752acc420b3120e6a1471ba7fff83245e6f8a0fbf915e81dd25e71c53077a1f36d656af0e2846d02806f639f5395ba5cfe8f96553526ff468fb2f4afc13d9b7c6cf1", 0xc0}, {&(0x7f0000000b80)="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", 0x1000}, {&(0x7f0000001b80)="3a747f6174365cbc24cdbefbb6f520236bab878e4ec188c39ffec1abb3cf0dd5e5f5b7b7051eb89e7f1fa7eefde3fe6d2a3099c8212066a3326962155c9166b37a62c01b9914c5bb478b928a89d9e9b2fb1b2b9b84d6bcc6ba064111116942870fb4af4ba5ffe1fd039f31083bc753538f8848b46d099bad2085891e61bdef983d0eb7bf64f216ad09b06bc399a02f7a0709c72912b2691731cbf040aaaf53465c2b320717342135ff48dea930e731e7102e405e7326d0fe627d0fce", 0xbc}], 0x5, &(0x7f0000002e80)=[@rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30, 0x24004800}}, {{&(0x7f0000002ec0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003200)=[{&(0x7f0000002f40)="02a460400caf19e2ab7e0361214fb6f6cbe85d9f05904b0a2ddb6817125772c359638bf1682e287109f727758c98871e26887ab5878c55931f347e0e340fb7e560ad2036e113843af6e424d806f3a6f09f8810c74ee5beeb0900206e74af702aef299fc2603ec46ce3aaeaf91a91ad9d8a1e39c4a8b3fba97fdfd4d581ffa4baa11c6cb3f562c7d5253b001fede2cba2590f4c18f1918881daa5735a62119d290d9ebd432c6adff0e03c6298e6acb91846c64e6e69e350e96b500825a4f6116c17", 0xc1}, {&(0x7f0000003040)="34792dd1d7f5767a60b7aa492a313d44e953b8f4eb3ef05ec825906114db9df2788e79f85cb6ad58a4f555f051c114d50a3290c548dbf089057f2e203cd7b909a69de8de1927032a3fd386b9dabf5f62dc8f4de8cd7ec823966fdc6d029b5b8da2994d867fac3cdc4e6f149691185e42e68951941d90867537155c261ce7332d8494623b88d7eb83", 0x88}, {&(0x7f0000003100)="3604079c1e1ae080af6a90ac46f86d97d959029d6d58b498394dc91cba83396bb8b581b4299c49f1c0870e456ecfd75768a4cb2f4b2eea3a0b5d2e2b79d563fca75ad324a77b49b6565d6df06e298990eb27e32daed6e12ac6909264d84c78bea7d9796156e45be4e7faa865744b50c4ebe43607f91ebc2aac159e581f5ac62b10b5f5429a6f65603dff1754e9a131b60cc73affa7015f2ae5658048fbb24d5f3b85d327f5b2d35c1f860e8103", 0xad}, {&(0x7f00000031c0)="6684e1176e7c863b15c4023396", 0xd}], 0x4, &(0x7f0000003540)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60, 0x2000c0c0}}, {{&(0x7f00000035c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003680)=[{&(0x7f0000003640)="d996d42ed59ae9385c555803e451eefdb0dad010811b70e1acae8c6ce68b67f43919b812e6a8b44a5ed8d2aa834280b22d137c3f716783b8c9", 0x39}], 0x1, &(0x7f0000003fc0)=ANY=[@ANYBLOB="100000000000000001000000010000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYBLOB="38000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000e602000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x148, 0x20044000}}, {{0x0, 0x0, &(0x7f0000005400)=[{&(0x7f0000004140)="7007d13cbcfe1fa9ca39913112d509a79a6aba02458c39615cdec0a33ffe5c51702e77438f7969eba45fa3375f872471a76d6d058f672e995eb11f7a4ae9391da96a1cca590cedf5bafe31f656531b9d7bd7979ea132b020fa170c0933986c249381efc4826765ea73d3610b11b413a351eb6b2490f7e30388a299c2444ca24483dde5b6f3d690fb", 0x88}, {&(0x7f0000004200)="39cb8651732e26f3c12758748c1d14455daa2f188c5c497521f80f715aae840c98e38d6476a7c2ed516157da518582c596be80877cf2a7f08325419fa736b93c9e350a84729c4b389945c0f54e75d4c29955ff2f6d9a98ff71b7371970fec5fb58944ab3ed946c49cc1ed1fc4298f4441403b0bea2f3ad4f93e3006f7263618df520415a735b11cfcfc696ec37666f585271c16cd5e8e37787d61b5887332bcae30769a7dd224c0c5ee69e9017d68dae53233b97f949c5778dc1712b4233a9b176a985e239a2e1db752c7153f84dd5bd4ce6fe0f161208d2ebb449a5dd13622a6c", 0xe1}, {&(0x7f0000004300)="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", 0x1000}, {&(0x7f0000005300)="7e30642ad4e457216971bbc59c3d3e0637a6efc200b2a91556c26a7fd08f5671cf4c04a1a089c0bb35eaa1c8034a5ca3c2ee4600ad3e2487cb4a62fea7caa30b415034f481aae21bce1b9b4fc9ad40062dbe587d0a5888d4575725bfe3fec6aede247a361d6bc031a924952f0da7c02bd1e067fd3694a00ca5fc6545374a4bc76cfface6bad04663b5c925f34ebfc0a5a56ce5a0cefc88cd0909ae0137a261ebf6626b5c5c3d3d0fb21d06da9d0dbc886ff6116a9615e57d2ec16788d7b490fa7b8ab1824be429815ba14367f48df773a4010e1dbd3d666ab46f54683654c83fa9de1c9dadad2468a93796e70da7", 0xee}], 0x4, &(0x7f0000002040)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r0, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32=r9, @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYBLOB="000800ff01000002000000000100000001000000ad50f786bba8f873c8ace6db605a90f2fa4749dff10ddb95bd2e0444c50685cebc106028f266c7dbde7cb4849e402bdc97e479f59b73823d5ea882d01392df00c117fa07b9dc159e0575e4d906f21d309a9891d94023f8042367ab6bd63d277395ab3906b850d4d6daccd5ca3ba82b003b7c5a0587902d98e43a716d24d7a0f93e337da9fe18c8fe0bd53e28072771c44f9be6cab008d695042e44c1b1fd260f2fa60b26762b19869a334654fc", @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x150, 0x4000011}}, {{&(0x7f00000073c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000007500)=[{&(0x7f0000007440)="267016d397f39f39f4d8b2424fdc1880e22acbd9e9474f378b3c7961f6d70fd50001072af0d38994832bf3e137f4b9bde84483bae56d2e3ddc741dc27fa56d75540284d259cd64e7f8ad270d838c1f5f90affd6ea946a5ea98ad0307dfc9ad28d166eddd6ceca9f01a96ea6e59a0feb8aac2f231f7f68e658a29ce666b9ceb1bb7db4fbaa0a7a8a5bf85d1193a30b22385d2cf40f81d4de189306c519bfaeb2f66af121ec7435d46ec58870d5e882e0c0f9214cf657213b3", 0xb8}], 0x1, &(0x7f0000001ec0)=[@rights={{0x1c, 0x1, 0x1, [r1, 0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r1, r0]}}, @rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, r1]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r7}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, r0, r1, r3]}}, @cred={{0x1c, 0x1, 0x2, {r4, r6, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, r8}}}], 0x160, 0x4080}}, {{&(0x7f0000008dc0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000091c0)=[{&(0x7f0000008e40)="284a7871a96ba859d8e170782b809fd6a15fa695ae8dfbb8e37a6d24fcb821d62db84c036991fe03ae36d46a2878dddfa9cde3d89b5718acebdcd6c76db1b9e381d8fa318def96b81df982378e76d73e90d126a27148e7d38d4d1f9ce194aa1680a9f9cf956490ef6ef83686ec13b7a79b4c821dea8c0f7aee08f055f9b1c9fdb5939025567c90d1b300957135c601847c46d9b56175c97869b8aebdeb2da1903de3a7de8a7b1f58148d1cf16eae869c24b5d6599d3ae41cbfcf9a3a5913c23edaf73fd3c531349260", 0xc9}, {&(0x7f0000008f40)="a28c5b65", 0x4}, {&(0x7f0000008f80)="4b61c499c208681e76184d5a5c35f4e94529ded2ab93aca32b800ec25a3e41f2f97bba7209347b51e670ee6bd3b38b8021432546c17d1536e610558a2f9519c85df4d630dde44ffb3493da97354098bf7c7c1e80f50cd16fd0286c8c1ae9c4e79d78218978520eee57c05057ae6779ef3f155de56a0962b88df36001487e59b0ab019d6fcd5c9dffdde21fc4dea1c81f6056fe8042533855bf4074b50636df3d16deae6104d9b132d7a5e9c992d03821286ff12aaf4c61ed1aee094c493e6d7bc2f8252650f87d0240d6bbed8431eef4022cf4f2ae9ce93a612032f25f1619344310faff02e1edc33f42765fc6a6ba1d98e9cfc7b61148f07a4d59b0da5810", 0xff}, {&(0x7f0000009080)="48989c9e0de7b26103b9da2b6bce74ca8ba82fc28d5e4321e2c7bdd145722f7d7e0a27b352088437bfa02aca2a", 0x2d}, {&(0x7f00000090c0)='*', 0x1}, {&(0x7f0000009100)="e8", 0x1}, {&(0x7f0000009140)="d092cb17b84e6971439beac28e23019cb946bf5e79980fca395558b62e759719a49584833bc66f53f1091b880f5486d35a3deece3bca33f8f78af88f7d64691ee89005b87a9449963f50842055681b4459292993f6ca5916a9f747afcc162a5e81f5663e485eceee52b763", 0x6b}], 0x7, &(0x7f0000009300)=[@rights={{0x1c, 0x1, 0x1, [r0, r9, r11]}}, @rights={{0x1c, 0x1, 0x1, [r1, r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, r1]}}], 0x58, 0x4041}}], 0x8, 0xc000) lseek(r1, 0x9, 0x3) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf00000c000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 769.830941][T14680] loop0: p4 start 2415919104 is beyond EOD, truncated [ 769.899167][T14728] loop4: detected capacity change from 0 to 224 [ 769.920105][ T1039] loop0: p1 p2 p3 p4 [ 769.924302][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 769.930484][ T1039] loop0: p2 start 7077888 is beyond EOD, truncated [ 769.937098][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 769.943278][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:53 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:53 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000d00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:53 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) fdatasync(0xffffffffffffffff) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:53 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000074000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:53 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:35:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bfffff1f000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000010000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:53 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x7fff, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000001300)="c3d197b237326fcd1e08f310cfd4cc59f82cb21fba89490a3202dbd0840e7517e19c472373c1aa8eccbfd7c7177335239c398c544e73058570d637231ab1e15db11eb362d844124ce2389b6dcea327e58387fb971933eb3bdbb2a95354289435a2a89aa9936035751d1604f2b175cd6c1ffc42548a019c40ffa07a2cff562dca821cfb846fc3134155648c06f971b8b7b5a6b1d1e3eee900d97ada4cbd988853023afc1f8d1ef39b5b26bdd5", 0xac}], 0x1, 0x1) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0xff, 0x1000, &(0x7f0000000300)="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"}]}) getdents64(r2, &(0x7f00000001c0)=""/267, 0x18) r3 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa, 0x10, r3, 0xab21e000) getdents64(r2, &(0x7f0000000180)=""/47, 0x2f) [ 770.470884][T14744] loop5: detected capacity change from 0 to 224 [ 770.481389][T14747] loop0: detected capacity change from 0 to 1 [ 770.489642][T14748] loop4: detected capacity change from 0 to 224 07:35:53 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000e00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:53 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:35:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000020000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 770.563958][T14747] loop0: p1 p2 p3 p4 [ 770.568185][T14747] loop0: p1 start 10 is beyond EOD, truncated [ 770.574326][T14747] loop0: p2 start 7602176 is beyond EOD, truncated [ 770.579446][T14767] loop4: detected capacity change from 0 to 224 [ 770.580867][T14747] loop0: p3 start 225 is beyond EOD, truncated [ 770.580884][T14747] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:53 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x440c2, 0x2) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x8, 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x8, 0x0) getdents64(r3, &(0x7f00000000c0)=""/34, 0x22) [ 770.644616][T14776] loop5: detected capacity change from 0 to 224 [ 770.686205][T14747] loop0: detected capacity change from 0 to 1 [ 770.708026][T14790] loop4: detected capacity change from 0 to 224 [ 770.720293][T14747] loop0: p1 p2 p3 p4 [ 770.733983][T14747] loop0: p1 start 10 is beyond EOD, truncated [ 770.740246][T14747] loop0: p2 start 7602176 is beyond EOD, truncated [ 770.746834][T14747] loop0: p3 start 225 is beyond EOD, truncated [ 770.752997][T14747] loop0: p4 start 2415919104 is beyond EOD, truncated [ 770.799461][ T1039] loop0: p1 p2 p3 p4 [ 770.803614][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 770.809795][ T1039] loop0: p2 start 7602176 is beyond EOD, truncated [ 770.816390][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 770.822821][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:54 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:54 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000f00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup3(r0, r0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000140)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x8, r1, &(0x7f0000000300)="d3dbf7d3f0d0a4cee1eed9e4a9c06dbbc952d75cfe2ec4c4a580aecbd73c0410836d1d5307338e2a3b4838e2c2afbf0304ac84b5ac8ac69dce01ec99f527cef50eb806824ef5131ff082ce0f3ba9bcd05b9b23204e0705f0b85ec3f233eef98038365a98b9b77138298c9a2e6ebea07c21d41af30ef9e0e8ea41c7472b0d09decda84b332c539ed33205064a64b169a163ab3675309211e2cf2cbf630e12775c45d9a18f085c76aa", 0xa8, 0x9, 0x0, 0x3, r2}]) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r3, &(0x7f00000001c0)=""/267, 0x18) getdents64(r3, &(0x7f0000000080)=""/47, 0x2f) 07:35:54 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:35:54 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000004020000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:54 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00080000007a000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) [ 771.375118][T14810] loop5: detected capacity change from 0 to 224 [ 771.380395][T14812] loop4: detected capacity change from 0 to 224 [ 771.384683][T14814] loop0: detected capacity change from 0 to 1 07:35:54 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000030000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:54 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:35:54 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf201000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:54 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000040000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 771.484300][T14814] loop0: p1 p2 p3 p4 [ 771.488596][T14814] loop0: p1 start 10 is beyond EOD, truncated [ 771.493057][T14839] loop4: detected capacity change from 0 to 224 [ 771.494697][T14814] loop0: p2 start 7995392 is beyond EOD, truncated [ 771.507421][T14814] loop0: p3 start 225 is beyond EOD, truncated [ 771.513601][T14814] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:54 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 771.575134][T14814] loop0: detected capacity change from 0 to 1 [ 771.584513][T14846] loop5: detected capacity change from 0 to 224 [ 771.621521][T14814] loop0: p1 p2 p3 p4 [ 771.625697][T14814] loop0: p1 start 10 is beyond EOD, truncated [ 771.631813][T14814] loop0: p2 start 7995392 is beyond EOD, truncated [ 771.638331][T14814] loop0: p3 start 225 is beyond EOD, truncated [ 771.642340][T14855] loop4: detected capacity change from 0 to 224 [ 771.644500][T14814] loop0: p4 start 2415919104 is beyond EOD, truncated [ 771.799746][ T1039] loop0: p1 p2 p3 p4 [ 771.804059][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 771.810245][ T1039] loop0: p2 start 7995392 is beyond EOD, truncated [ 771.816738][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 771.823071][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:55 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:35:55 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:55 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x5, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/258, 0x102) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0x0, r5) recvmmsg$unix(r3, &(0x7f0000000e40)=[{{&(0x7f0000000580), 0x6e, &(0x7f0000000600), 0x0, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}}, {{&(0x7f0000000740)=@abs, 0x6e, &(0x7f0000000cc0)=[{&(0x7f00000007c0)=""/75, 0x4b}, {&(0x7f0000000840)=""/77, 0x4d}, {&(0x7f00000008c0)=""/23, 0x17}, {&(0x7f0000000900)=""/17, 0x11}, {&(0x7f0000000940)=""/17, 0x11}, {&(0x7f0000000980)=""/142, 0x8e}, {&(0x7f0000000a40)=""/34, 0x22}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000b40)=""/128, 0x80}, {&(0x7f0000000bc0)=""/197, 0xc5}], 0xa, &(0x7f0000000d80)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0}}], 0x2, 0x40002000, &(0x7f0000000ec0)) r7 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0x0, r8) r9 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r9, 0x8, 0x0) r10 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r10, 0x8, 0x0) r11 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000180)="58334fc2d5eee28cb46261f21b515a085dc11796e495e0", 0x17}, {&(0x7f0000000380)="611fc553a252c468c9a2260a0cff3f14bf4d354ddeb6c13bc34b7bd8af887b3786c6ef528445bfbe007e35ba08c9d6c0", 0x30}, {&(0x7f00000003c0)="d0472f5d6261015aeefc7edb4d394fe6a7ecfc8d229817ec2938719e3e730ec9adf3d1f9bfa9a0d301948fc0eea5511093b6fbcc5144f992e03d3c33a0ceed42eb240c11dffc9018883d03624a1b4bb119e364be6ad890e139c6d80c5cd6eec1620fb01c63dcda034b62dd8b427d988ed0120fd75cc45f5ce84bdf5fb889d0d8c7", 0x81}, {&(0x7f0000000480)="e32c9a0eac4da078bb3000d511cd74216189b0d72792d7fe23b968bc9b3cdc953dcb92a5c454c9e7b088ca8ba3ccb64834f7de85cf2679bccc3ffdde64cfab88905ddb5d035da02c3084350d0e6053", 0x4f}], 0x4, &(0x7f0000000f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r5}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r6, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r8}}}, @rights={{0x28, 0x1, 0x1, [r9, r3, r10, r3, r1, r11]}}, @rights={{0x10}}], 0x98, 0x4}, 0x1) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000140)={0x40, 0xe, 0x6, 0x9, "0562ba730d85c0b9f052d6c98bf0b9b82b53515b20e95bc4baaeeb8d9daf2f2e"}) 07:35:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000050000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:55 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000480000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:55 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf001100000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000060000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 772.276903][T14875] loop4: detected capacity change from 0 to 224 [ 772.284251][T14876] loop0: detected capacity change from 0 to 1 [ 772.291952][T14878] loop5: detected capacity change from 0 to 224 07:35:55 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf001200000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 772.339455][T14876] loop0: p1 p2 p3 p4 [ 772.343857][T14876] loop0: p1 start 10 is beyond EOD, truncated [ 772.349999][T14876] loop0: p2 start 8389632 is beyond EOD, truncated [ 772.356493][T14876] loop0: p3 start 225 is beyond EOD, truncated [ 772.362668][T14876] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:55 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008ffffff80000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:55 executing program 1: ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000480)=""/220) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) wait4(0xffffffffffffffff, &(0x7f00000000c0), 0x80000001, &(0x7f00000003c0)) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:35:55 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 772.405944][T14892] loop4: detected capacity change from 0 to 224 [ 772.422500][T14900] loop5: detected capacity change from 0 to 224 07:35:55 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf001800000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000004060000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 772.485057][T14911] loop0: detected capacity change from 0 to 1 [ 772.539447][T14911] loop0: p1 p2 p3 p4 [ 772.546448][T14911] loop0: p1 start 10 is beyond EOD, truncated [ 772.552657][T14911] loop0: p2 start 8454143 is beyond EOD, truncated [ 772.559166][T14911] loop0: p3 start 225 is beyond EOD, truncated [ 772.564684][T14922] loop4: detected capacity change from 0 to 224 [ 772.565428][T14911] loop0: p4 start 2415919104 is beyond EOD, truncated [ 772.572001][T14923] loop5: detected capacity change from 0 to 224 [ 772.639539][T14911] loop0: detected capacity change from 0 to 1 [ 772.671233][T14911] loop0: p1 p2 p3 p4 [ 772.675438][T14911] loop0: p1 start 10 is beyond EOD, truncated [ 772.681535][T14911] loop0: p2 start 8454143 is beyond EOD, truncated [ 772.688027][T14911] loop0: p3 start 225 is beyond EOD, truncated [ 772.694190][T14911] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:56 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:35:56 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000140)=@nfc={0x27, 0x1, 0x0, 0x5}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000003c0)={0x78, r1, 0x1, 0x70bd27, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_FEATURES_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x78}}, 0x8810) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x44, r1, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x11}, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r5, &(0x7f00000001c0)=""/267, 0x18) getdents64(r5, &(0x7f0000000080)=""/47, 0x2f) 07:35:56 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf001900000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000070000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:56 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008ffffff8c000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:56 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf102000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:56 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x10b) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x8, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f00000000c0)={0x9b, 0x18, 0xf801, 0xf3, "618e5ca0a3f6d11b38916617e7f117bb6e8c490dc32f676ce59e0b348dc23066"}) 07:35:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000080000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 773.158413][T14948] loop5: detected capacity change from 0 to 224 [ 773.174312][T14952] loop0: detected capacity change from 0 to 1 [ 773.174418][T14951] loop4: detected capacity change from 0 to 224 07:35:56 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 773.247486][T14952] loop0: p1 p2 p3 p4 [ 773.259464][T14952] loop0: p1 start 10 is beyond EOD, truncated [ 773.265578][T14952] loop0: p2 start 9240575 is beyond EOD, truncated [ 773.272205][T14952] loop0: p3 start 225 is beyond EOD, truncated [ 773.278353][T14952] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:56 executing program 1: syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000140)=0xfffffff7, 0x4) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f00000000c0)=0x10001) getdents64(r0, &(0x7f00000001c0)=""/267, 0x18) getdents64(r0, &(0x7f0000000080)=""/47, 0x2f) getdents64(r0, &(0x7f0000000300)=""/94, 0x5e) 07:35:56 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf002200000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 773.303975][T14972] loop5: detected capacity change from 0 to 224 [ 773.349980][T14980] loop4: detected capacity change from 0 to 224 [ 773.375509][T14952] loop0: detected capacity change from 0 to 1 07:35:56 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:35:56 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df00001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f00000000c0)={0x3, 0x16, 0x100, 0x6, "a3067e76ea6e1c0f312dd0d5931b896d5e133b9f7138d645d33e9051fd3ee473"}) getdents64(r0, &(0x7f0000000300)=""/4096, 0x1000) [ 773.402618][T14989] loop5: detected capacity change from 0 to 224 [ 773.440403][T14952] loop0: p1 p2 p3 p4 [ 773.447061][T14952] loop0: p1 start 10 is beyond EOD, truncated [ 773.453773][T14952] loop0: p2 start 9240575 is beyond EOD, truncated [ 773.460363][T14952] loop0: p3 start 225 is beyond EOD, truncated [ 773.466588][T14952] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:56 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:56 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf002500000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000090000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:56 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008ffffff97000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:56 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/58, 0x9) 07:35:56 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 774.064691][T15016] loop5: detected capacity change from 0 to 224 [ 774.079072][T15022] loop0: detected capacity change from 0 to 1 [ 774.088243][T15021] loop4: detected capacity change from 0 to 224 07:35:57 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf003f00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000000a0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:57 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 774.159513][T15022] loop0: p1 p2 p3 p4 [ 774.163656][T15022] loop0: p1 start 10 is beyond EOD, truncated [ 774.169750][T15022] loop0: p2 start 9961471 is beyond EOD, truncated [ 774.176250][T15022] loop0: p3 start 225 is beyond EOD, truncated [ 774.182426][T15022] loop0: p4 start 2415919104 is beyond EOD, truncated [ 774.257980][T15022] loop0: detected capacity change from 0 to 1 [ 774.269951][T15044] loop5: detected capacity change from 0 to 224 07:35:57 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf004000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000000b0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:57 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 774.304472][T15051] loop4: detected capacity change from 0 to 224 [ 774.320181][T15022] loop0: p1 p2 p3 p4 [ 774.324358][T15022] loop0: p1 start 10 is beyond EOD, truncated [ 774.330514][T15022] loop0: p2 start 9961471 is beyond EOD, truncated [ 774.337108][T15022] loop0: p3 start 225 is beyond EOD, truncated [ 774.343317][T15022] loop0: p4 start 2415919104 is beyond EOD, truncated [ 774.415485][T15063] loop5: detected capacity change from 0 to 224 [ 774.444018][T15068] loop4: detected capacity change from 0 to 224 07:35:57 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:57 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf004800000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:57 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008ac69c49b000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000000c0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:57 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:35:58 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf004c00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 774.989793][T15084] loop5: detected capacity change from 0 to 224 [ 775.008966][T15088] loop0: detected capacity change from 0 to 1 [ 775.010030][T15087] loop4: detected capacity change from 0 to 224 07:35:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000000d0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 775.070300][T15088] loop0: p1 p2 p3 p4 [ 775.075407][T15088] loop0: p1 start 10 is beyond EOD, truncated [ 775.081544][T15088] loop0: p2 start 10208361 is beyond EOD, truncated [ 775.088132][T15088] loop0: p3 start 225 is beyond EOD, truncated [ 775.094340][T15088] loop0: p4 start 2415919104 is beyond EOD, truncated [ 775.125725][T15104] loop5: detected capacity change from 0 to 224 [ 775.162516][T15088] loop0: detected capacity change from 0 to 1 07:35:58 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 775.180059][T15113] loop4: detected capacity change from 0 to 224 [ 775.211077][T15088] loop0: p1 p2 p3 p4 [ 775.219761][T15088] loop0: p1 start 10 is beyond EOD, truncated 07:35:58 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf015800000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 775.225857][T15088] loop0: p2 start 10208361 is beyond EOD, truncated [ 775.232472][T15088] loop0: p3 start 225 is beyond EOD, truncated [ 775.238616][T15088] loop0: p4 start 2415919104 is beyond EOD, truncated [ 775.266362][ T1039] loop0: p1 p2 p3 p4 07:35:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000000e0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:58 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008ffffffa1000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:58 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf016100000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 775.276559][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 775.277925][T15125] loop5: detected capacity change from 0 to 224 [ 775.282704][ T1039] loop0: p2 start 10208361 is beyond EOD, truncated [ 775.295557][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 775.301744][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated [ 775.350666][T15130] loop0: detected capacity change from 0 to 1 [ 775.393646][T15130] loop0: p1 p2 p3 p4 [ 775.398273][T15130] loop0: p1 start 10 is beyond EOD, truncated [ 775.404500][T15130] loop0: p2 start 10616831 is beyond EOD, truncated [ 775.411236][T15130] loop0: p3 start 225 is beyond EOD, truncated [ 775.417600][T15130] loop0: p4 start 2415919104 is beyond EOD, truncated [ 775.444740][T15138] loop4: detected capacity change from 0 to 224 [ 775.461008][T15141] loop5: detected capacity change from 0 to 224 [ 775.502260][T15130] loop0: detected capacity change from 0 to 1 [ 775.542082][T15130] loop0: p1 p2 p3 p4 [ 775.546465][T15130] loop0: p1 start 10 is beyond EOD, truncated [ 775.552657][T15130] loop0: p2 start 10616831 is beyond EOD, truncated [ 775.559284][T15130] loop0: p3 start 225 is beyond EOD, truncated [ 775.565538][T15130] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:58 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:58 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:35:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000000f0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:58 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf006800000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:58 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf00089bc469ac000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:58 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf006c00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 775.862996][T15168] loop0: detected capacity change from 0 to 1 [ 775.871969][T15170] loop5: detected capacity change from 0 to 224 [ 775.872726][T15169] loop4: detected capacity change from 0 to 224 07:35:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000100000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 775.935434][T15168] loop0: p1 p2 p3 p4 [ 775.940492][T15168] loop0: p1 start 10 is beyond EOD, truncated [ 775.946955][T15168] loop0: p2 start 11299268 is beyond EOD, truncated [ 775.953737][T15168] loop0: p3 start 225 is beyond EOD, truncated [ 775.960119][T15168] loop0: p4 start 2415919104 is beyond EOD, truncated [ 776.008594][T15184] loop5: detected capacity change from 0 to 224 07:35:59 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf007400000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:59 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 776.050201][T15168] loop0: detected capacity change from 0 to 1 [ 776.079478][T15168] loop0: p1 p2 p3 p4 [ 776.083583][T15168] loop0: p1 start 10 is beyond EOD, truncated [ 776.089712][T15168] loop0: p2 start 11299268 is beyond EOD, truncated [ 776.096397][T15168] loop0: p3 start 225 is beyond EOD, truncated [ 776.102611][T15168] loop0: p4 start 2415919104 is beyond EOD, truncated [ 776.119459][T15195] loop4: detected capacity change from 0 to 224 07:35:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000110000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:59 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800002ead000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) [ 776.149586][T15199] loop5: detected capacity change from 0 to 224 [ 776.162473][ T1039] loop0: p1 p2 p3 p4 [ 776.167011][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 776.173132][ T1039] loop0: p2 start 11299268 is beyond EOD, truncated [ 776.179745][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 776.186077][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:59 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf027800000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 776.288739][T15205] loop4: detected capacity change from 0 to 224 [ 776.306109][T15210] loop5: detected capacity change from 0 to 224 [ 776.383187][T15218] loop0: detected capacity change from 0 to 1 [ 776.439595][T15218] loop0: p1 p2 p3 p4 [ 776.444356][T15218] loop0: p1 start 10 is beyond EOD, truncated [ 776.450560][T15218] loop0: p2 start 11349504 is beyond EOD, truncated [ 776.457155][T15218] loop0: p3 start 225 is beyond EOD, truncated [ 776.463847][T15218] loop0: p4 start 2415919104 is beyond EOD, truncated [ 776.509605][T15218] loop0: detected capacity change from 0 to 1 [ 776.559522][T15218] loop0: p1 p2 p3 p4 [ 776.565646][T15218] loop0: p1 start 10 is beyond EOD, truncated [ 776.571987][T15218] loop0: p2 start 11349504 is beyond EOD, truncated [ 776.578578][T15218] loop0: p3 start 225 is beyond EOD, truncated [ 776.584776][T15218] loop0: p4 start 2415919104 is beyond EOD, truncated 07:35:59 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:35:59 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:35:59 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf027900000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000120000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:59 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008ffffffc9000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:35:59 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf007a00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 776.711551][T15240] loop0: detected capacity change from 0 to 1 [ 776.717964][T15242] loop5: detected capacity change from 0 to 224 [ 776.719060][T15244] loop4: detected capacity change from 0 to 224 07:35:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000180000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:35:59 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf018600000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 776.779973][T15240] loop0: p1 p2 p3 p4 [ 776.784134][T15240] loop0: p1 start 10 is beyond EOD, truncated [ 776.790332][T15240] loop0: p2 start 13238271 is beyond EOD, truncated [ 776.797026][T15240] loop0: p3 start 225 is beyond EOD, truncated [ 776.803215][T15240] loop0: p4 start 2415919104 is beyond EOD, truncated [ 776.814583][T15255] loop5: detected capacity change from 0 to 224 07:35:59 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r0, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 776.877189][T15240] loop0: detected capacity change from 0 to 1 [ 776.919531][T15240] loop0: p1 p2 p3 p4 [ 776.923814][T15240] loop0: p1 start 10 is beyond EOD, truncated [ 776.929931][T15240] loop0: p2 start 13238271 is beyond EOD, truncated [ 776.936522][T15240] loop0: p3 start 225 is beyond EOD, truncated [ 776.942817][T15240] loop0: p4 start 2415919104 is beyond EOD, truncated [ 776.954033][T15270] loop5: detected capacity change from 0 to 224 07:35:59 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r0, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 776.963830][T15271] loop4: detected capacity change from 0 to 224 07:35:59 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf018700000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:35:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000190000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 777.043299][T15280] loop5: detected capacity change from 0 to 224 [ 777.131902][T15291] loop4: detected capacity change from 0 to 224 07:36:02 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000acb000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:36:02 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000640)) ptrace(0x4206, r0) ptrace(0x4208, r0) 07:36:02 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r0, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000010200000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057840)={0xff, [], 0x8, "a045bf8030ca57"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004f080)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004f280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3f, "7c94a433641ba6"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000050280)={{0x0, 0x7072, 0x8, 0xfffffffffffffffc, 0x8, 0x1ff, 0x7, 0x1, 0x2, 0x8, 0xffffffff, 0x800, 0x3, 0x3, 0x2}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r9}, {}, {r8}, {r8}, {r8}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {r7, r9}, {0x0, r9}, {}, {r8, r9}, {0x0, r9}, {}, {}, {}, {0x0, r9}, {}, {0x0, r9}, {0x0, r9}, {r8}, {0x0, r9}, {}, {}, {r7}, {0x0, r9}, {}, {}, {r7, r9}, {r8}, {}, {0x0, r9}, {r8, r9}, {0x0, r9}, {r7, r9}, {}, {0x0, r9}, {r8}, {}, {}, {r8}, {0x0, r9}, {}, {0x0, r9}, {}, {r7, r9}, {0x0, r9}, {r7}, {}, {r8}, {r7}, {}, {r8, r9}, {}, {0x0, r9}, {0x0, r9}, {}, {0x0, r9}, {r8, r9}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {r8}, {0x0, r9}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {0x0, r9}, {r7}, {0x0, r9}, {}, {}, {r7, r9}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {r8}, {0x0, r9}, {0x0, r9}, {r7}, {r8, r9}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {}, {0x0, r9}, {r7}, {0x0, r9}, {}, {0x0, r9}, {r7, r9}, {0x0, r9}, {r8, r9}, {r7, r9}, {r8}, {}, {r7, r9}, {r7}, {0x0, r9}, {}, {r7}, {0x0, r9}, {}, {}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {}, {}, {r7, r9}, {0x0, r9}, {r8, r9}, {r7, r9}, {0x0, r9}, {}, {}, {r8}, {}, {}, {0x0, r9}, {r7}, {}, {r8}, {}, {0x0, r9}, {r8}, {0x0, r9}, {0x0, r9}, {}, {0x0, r9}, {}, {0x0, r9}, {}, {r7}, {}, {}, {}, {0x0, r9}, {r7, r9}, {r8}, {}, {0x0, r9}, {}, {r8}, {}, {}, {}, {r7}, {r7}, {0x0, r9}, {r7}, {r8, r9}, {0x0, r9}, {r7}, {}, {r7}, {0x0, r9}, {r8}, {r7, r9}, {0x0, r9}, {}, {0x0, r9}, {}, {}, {0x0, r9}, {r8}, {r7}, {}, {r7}, {}, {0x0, r9}, {r8, r9}, {0x0, r9}, {0x0, r9}, {}, {}, {r8, r9}, {r7}, {r8}, {r8, r9}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {r8}, {0x0, r9}, {r7}, {r8}, {r8}, {}, {}, {r8}, {0x0, r9}, {}, {r7, r9}, {r7}, {}, {}, {0x0, r9}, {}, {r8, r9}, {r7}, {0x0, r9}, {}, {}, {r7, r9}, {r8, r9}, {r8}, {r7, r9}, {}, {}, {r8}, {r7, r9}, {0x0, r9}, {}, {0x0, r9}, {r8}, {r8}, {r7}, {}, {r8, r9}, {r8}, {0x0, r9}, {}, {}, {}, {r7, r9}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055300)={0x8f4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x0, "0d4abfd4b32220"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000050340)={{0x0, 0x9, 0x8001, 0xb3, 0xffffffffffffc82d, 0x6, 0x7f, 0x9, 0x0, 0x80000000, 0x4, 0x2, 0xff, 0x3, 0x10000}, 0x20, [0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000050400)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050600)={0x9980, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "4122e4b8ece5ab"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000051600)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000051800)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {0x0, r3}, {r4}, {}, {r7}, {r10}, {r11, r12}, {0x0, r13}], 0x4, "327ecc549d1a0a"}) 07:36:02 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf029e00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:02 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf02a600000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x8, 0x0) getdents(r2, &(0x7f00000000c0)=""/22, 0x16) openat(r2, &(0x7f0000000140)='./file0\x00', 0x70500, 0x100) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000220000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 779.710703][T15306] loop4: detected capacity change from 0 to 224 [ 779.717375][T15308] loop5: detected capacity change from 0 to 224 [ 779.730250][T15310] loop0: detected capacity change from 0 to 1 [ 779.790351][T15310] loop0: p1 p2 p3 p4 [ 779.794874][T15310] loop0: p1 start 10 is beyond EOD, truncated [ 779.801308][T15310] loop0: p2 start 13306368 is beyond EOD, truncated [ 779.808016][T15310] loop0: p3 start 225 is beyond EOD, truncated [ 779.814395][T15310] loop0: p4 start 2415919104 is beyond EOD, truncated [ 779.823403][T15328] loop5: detected capacity change from 0 to 224 07:36:02 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bfc0ed00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f00000000c0)={0x7, 0x6, 0x6, 0x7, 0x800, 0x6}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000250000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 779.840757][T15327] loop4: detected capacity change from 0 to 224 [ 779.882979][T15310] loop0: detected capacity change from 0 to 1 07:36:02 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000acc000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) [ 779.927488][T15350] loop4: detected capacity change from 0 to 224 [ 779.940632][T15310] loop0: p1 p2 p3 p4 [ 779.944695][T15351] loop5: detected capacity change from 0 to 224 [ 779.950139][T15310] loop0: p1 start 10 is beyond EOD, truncated [ 779.957530][T15310] loop0: p2 start 13306368 is beyond EOD, truncated [ 779.964177][T15310] loop0: p3 start 225 is beyond EOD, truncated [ 779.970474][T15310] loop0: p4 start 2415919104 is beyond EOD, truncated 07:36:02 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000640)) ptrace(0x4206, r0) ptrace(0x4208, r0) 07:36:02 executing program 1: prctl$PR_GET_DUMPABLE(0x3) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:02 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bffffe00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:02 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000003f0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:02 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:03 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000000c0)) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:03 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 780.106751][T15373] loop0: detected capacity change from 0 to 1 [ 780.108950][T15372] loop4: detected capacity change from 0 to 224 [ 780.121535][T15371] loop5: detected capacity change from 0 to 224 07:36:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000400000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:03 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x800c0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000140)=[{{r1, r2/1000+10000}, 0x2, 0x81, 0x3a2}], 0x18) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000400)={0x3, 0x1, 0x100, 0x0, "457a3a2569fc69503b3413762f65030d6af3912bf78dbb04e3773b22e6b710cc"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000440)={0x0, 0x0, 0x1f, 0x7fffffff, "ed005c000000132b3ec14360000000eb09000000010000001e002000"}) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000300)=""/214) getdents64(r3, &(0x7f00000001c0)=""/267, 0x18) clock_settime(0x7, &(0x7f0000000040)) getdents64(r3, &(0x7f0000000080)=""/47, 0x2f) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x38) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSABS20(r4, 0x401845e0, &(0x7f0000000180)={0x200, 0x7, 0x3ff, 0x20, 0x6, 0x8}) 07:36:03 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 780.165586][T15373] loop0: p1 p2 p3 p4 [ 780.169958][T15373] loop0: p1 start 10 is beyond EOD, truncated [ 780.176201][T15373] loop0: p2 start 13371904 is beyond EOD, truncated [ 780.183069][T15373] loop0: p3 start 225 is beyond EOD, truncated [ 780.189248][T15373] loop0: p4 start 2415919104 is beyond EOD, truncated 07:36:03 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0fff00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 780.264394][T15400] loop4: detected capacity change from 0 to 224 [ 780.287219][T15410] loop5: detected capacity change from 0 to 224 [ 780.310610][T15373] loop0: detected capacity change from 0 to 1 07:36:03 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000ace000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) [ 780.341528][T15373] loop0: p1 p2 p3 p4 [ 780.345634][T15373] loop0: p1 start 10 is beyond EOD, truncated [ 780.351938][T15373] loop0: p2 start 13371904 is beyond EOD, truncated [ 780.358602][T15373] loop0: p3 start 225 is beyond EOD, truncated [ 780.364958][T15373] loop0: p4 start 2415919104 is beyond EOD, truncated [ 780.449479][ T1039] loop0: p1 p2 p3 p4 [ 780.453667][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 780.459749][ T1039] loop0: p2 start 13371904 is beyond EOD, truncated [ 780.466495][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 780.472823][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated [ 780.531320][T15426] loop0: detected capacity change from 0 to 1 [ 780.569674][T15426] loop0: p1 p2 p3 p4 [ 780.573900][T15426] loop0: p1 start 10 is beyond EOD, truncated [ 780.580047][T15426] loop0: p2 start 13502976 is beyond EOD, truncated [ 780.586685][T15426] loop0: p3 start 225 is beyond EOD, truncated [ 780.592865][T15426] loop0: p4 start 2415919104 is beyond EOD, truncated [ 780.640021][T15426] loop0: detected capacity change from 0 to 1 [ 780.689646][T15426] loop0: p1 p2 p3 p4 [ 780.694208][T15426] loop0: p1 start 10 is beyond EOD, truncated [ 780.700399][T15426] loop0: p2 start 13502976 is beyond EOD, truncated [ 780.706986][T15426] loop0: p3 start 225 is beyond EOD, truncated [ 780.713354][T15426] loop0: p4 start 2415919104 is beyond EOD, truncated 07:36:03 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000640)) ptrace(0x4206, r0) ptrace(0x4208, r0) 07:36:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000480000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:03 executing program 1: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0xfffc, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) getdents64(r0, &(0x7f00000001c0)=""/263, 0x107) getdents64(r0, &(0x7f0000000080)=""/47, 0x2f) 07:36:03 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bffeff00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:03 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000ad1000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:36:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 780.981049][T15441] loop5: detected capacity change from 0 to 224 [ 780.985854][T15443] loop4: detected capacity change from 0 to 224 [ 780.989041][T15444] loop0: detected capacity change from 0 to 1 07:36:04 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000004000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000004c0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000008000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 781.059417][T15444] loop0: p1 p2 p3 p4 [ 781.063853][T15444] loop0: p1 start 10 is beyond EOD, truncated [ 781.070195][T15444] loop0: p2 start 13699584 is beyond EOD, truncated [ 781.076825][T15444] loop0: p3 start 225 is beyond EOD, truncated [ 781.083360][T15444] loop0: p4 start 2415919104 is beyond EOD, truncated [ 781.153546][T15473] loop4: detected capacity change from 0 to 224 [ 781.171873][T15480] loop5: detected capacity change from 0 to 224 [ 781.185567][T15444] loop0: detected capacity change from 0 to 1 [ 781.229434][T15444] loop0: p1 p2 p3 p4 [ 781.233657][T15444] loop0: p1 start 10 is beyond EOD, truncated [ 781.239739][T15444] loop0: p2 start 13699584 is beyond EOD, truncated [ 781.246479][T15444] loop0: p3 start 225 is beyond EOD, truncated [ 781.252759][T15444] loop0: p4 start 2415919104 is beyond EOD, truncated 07:36:04 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, 0x0) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:36:04 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x400882) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0xa00c43, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000140)={0x3, 0x17, 0x950b, 0x100, "e7c88be184315e17859e75dc4421be43fdcbe5ff8d6d69da647f116e5942bc13"}) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000300)=""/185) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r3, &(0x7f00000001c0)=""/267, 0x18) fcntl$notify(r1, 0x402, 0x20) getdents64(r3, &(0x7f0000000080)=""/47, 0x2f) 07:36:04 executing program 2: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf00000c000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000680000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:04 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000ad2000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:36:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bfffff1f000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:04 executing program 2: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:04 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000000c0)={0x5d, 0x20, 0xfe00, 0x8, "6ff014fc76cab601186307ce362487486f9e1dc79bbdcc84118d086499347138"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000140)=""/53, 0x35) 07:36:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000006c0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 781.880711][T15502] loop5: detected capacity change from 0 to 224 [ 781.882588][T15500] loop0: detected capacity change from 0 to 1 [ 781.906682][T15503] loop4: detected capacity change from 0 to 224 [ 781.949390][T15500] loop0: p1 p2 p3 p4 [ 781.953509][T15500] loop0: p1 start 10 is beyond EOD, truncated [ 781.959709][T15500] loop0: p2 start 13765120 is beyond EOD, truncated [ 781.966512][T15500] loop0: p3 start 225 is beyond EOD, truncated [ 781.972856][T15500] loop0: p4 start 2415919104 is beyond EOD, truncated [ 781.981583][T15520] loop5: detected capacity change from 0 to 224 07:36:04 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f00000000c0)={0x1, 0x1e, 0x9, 0xe9c, "265460f4e91dec662dbf85a69e3e4807ad793587981adb5c4a48f6be8329e64d"}) 07:36:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000740000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 782.023282][T15531] loop4: detected capacity change from 0 to 224 [ 782.043065][T15500] loop0: detected capacity change from 0 to 1 [ 782.116518][T15500] loop0: p1 p2 p3 p4 [ 782.120746][T15500] loop0: p1 start 10 is beyond EOD, truncated [ 782.124905][T15547] loop4: detected capacity change from 0 to 224 [ 782.127112][T15500] loop0: p2 start 13765120 is beyond EOD, truncated [ 782.140070][T15500] loop0: p3 start 225 is beyond EOD, truncated [ 782.146380][T15500] loop0: p4 start 2415919104 is beyond EOD, truncated [ 782.239735][ T1039] loop0: p1 p2 p3 p4 [ 782.243926][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 782.250253][ T1039] loop0: p2 start 13765120 is beyond EOD, truncated [ 782.256838][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 782.263023][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated 07:36:05 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, 0x0) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:36:05 executing program 2: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:05 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000010000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000180)={0x3, 0x8, '\x00', 0x0, &(0x7f0000000140)=[0x0]}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000000c0)={0x81, 0xc, 0xf3, 0x1ff, "36994b276536d7d5241dd0e94f62e8968df54403679b917a039c2c4c21e1804f"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000002780000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:05 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000ad3000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:36:05 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 782.778050][T15564] loop0: detected capacity change from 0 to 1 [ 782.788434][T15568] loop4: detected capacity change from 0 to 224 [ 782.802005][T15571] loop5: detected capacity change from 0 to 224 07:36:05 executing program 1: ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)=0x1) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r0, 0x4ad72000) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000007a0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000300)=""/158) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:05 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000020000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 782.839527][T15564] loop0: p1 p2 p3 p4 [ 782.849362][T15564] loop0: p1 start 10 is beyond EOD, truncated [ 782.855488][T15564] loop0: p2 start 13830656 is beyond EOD, truncated [ 782.862195][T15564] loop0: p3 start 225 is beyond EOD, truncated [ 782.868458][T15564] loop0: p4 start 2415919104 is beyond EOD, truncated 07:36:05 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 782.941290][T15599] loop4: detected capacity change from 0 to 224 [ 782.962726][T15564] loop0: detected capacity change from 0 to 1 [ 782.985730][T15610] loop5: detected capacity change from 0 to 224 07:36:06 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, 0x0) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:36:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bfffffff850000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:06 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008000003da000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:36:06 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$inet6(0xa, 0x1, 0x6) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:06 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:06 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000004020000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bfffffff8c0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:06 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000030000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 783.677354][T15629] loop0: detected capacity change from 0 to 1 [ 783.684351][T15630] loop4: detected capacity change from 0 to 224 [ 783.689741][T15631] loop5: detected capacity change from 0 to 224 07:36:06 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 783.731352][T15629] loop0: p1 p2 p3 p4 [ 783.738895][T15629] loop0: p1 start 10 is beyond EOD, truncated [ 783.745201][T15629] loop0: p2 start 14287616 is beyond EOD, truncated [ 783.751811][T15629] loop0: p3 start 225 is beyond EOD, truncated [ 783.758049][T15629] loop0: p4 start 2415919104 is beyond EOD, truncated 07:36:06 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = accept$inet6(r1, 0x0, &(0x7f00000000c0)) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f0000000300)={0x5, 0x4, 0x4467, 0x3533ea7a, 0xb0b, 0x9590}) copy_file_range(r2, &(0x7f0000000140)=0x96, r1, &(0x7f0000000180)=0x1f, 0x68, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:06 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 783.830180][T15659] loop4: detected capacity change from 0 to 224 [ 783.837937][T15662] loop5: detected capacity change from 0 to 224 07:36:06 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000002a60000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 783.900975][T15629] loop0: detected capacity change from 0 to 1 [ 783.953470][T15629] loop0: p1 p2 p3 p4 [ 783.957979][T15629] loop0: p1 start 10 is beyond EOD, truncated [ 783.964266][T15629] loop0: p2 start 14287616 is beyond EOD, truncated [ 783.970961][T15629] loop0: p3 start 225 is beyond EOD, truncated [ 783.977462][T15629] loop0: p4 start 2415919104 is beyond EOD, truncated [ 784.008506][T15686] loop4: detected capacity change from 0 to 224 07:36:07 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:36:07 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:07 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000040000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0x0, r5) r6 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r6, 0x8, 0x0) r7 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x4, 0x81, 0x3a, 0x8, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0xffff, 0x2}, 0x10080, 0x3, 0x7fffffff, 0x1, 0x1, 0x80, 0x2, 0x0, 0x8, 0x0, 0x8000}, 0x0, 0xf, r1, 0xf) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000001f00)=0xe8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001f80)=[{{&(0x7f0000000300)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001380)=[{&(0x7f0000000380)="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", 0x1000}], 0x1, 0x0, 0x0, 0x40}}, {{&(0x7f00000013c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000018c0)=[{&(0x7f0000001440)="de67d46949ec38f19f1a294d9274872b3745c61bc09516b0571aff070ef42bb546d1d455d1f9c90e0d29c35155677832c765d82133bec62ffd8a48b6c5a75bbdac857ba40f61d53563e832f43a4e485f96e8dc1d2a4d96a04fa52386ae628aaca7c19c6cd41ac71aa161a89a621cc1d5034a3d0ef67d7117df5570c7768a98b33b4ead989dcd6801a6769285181f19782ee3840ebee96474c75b42d1e9d05c2b6e92fa78039195f03c74c8c26d3abeebd3346b7866ba6f79ecad0e2b60cb643f2f219071026d23f3aec4be9b36e1766b1367cbd7758464a65d4b53e69866054b1951805a326bde8d5186f376bc1b49a86e05c3", 0xf3}, {&(0x7f0000001540)="e09d404d206a0028fec26be2e1e94ec4ed8709774706459e712fe351ae2c17e2a4987077244862f36b14f8c01edc2dc052418e81793c4aaa4dd82ae8a56556a026214d6b3ef3c542e512c73470619c2fb94caff982456549c9811c4d2b216cee71bab78829f9c7d411203c13c25882b570e1bd60e8729a71e8fa53391c", 0x7d}, {&(0x7f00000015c0)="863fcacce6f8a51ba3596c16cccaafc25e5c962a03965ea2cf8119234ea5da21579285edfb", 0x25}, {&(0x7f0000001600)="a3025a5d5e0a507d6d5ba37276b663dc105a9fe38754e763f9fd888c2ee62570e7268703fd330e2cf5476894465858ea412d44d6dec9ff7417ea7be19c97379c8286a6684cb841d8bf1de2796c6c2e8dcf4d7726551bd7955bbe678c948a4bcc82eb13fcd3da19d55676d2568a0dc3ec536aa64ca716d79612709bad2e143389c836e41f6aab5d047da9620e3c9f80c5bfd5e7647dbb2a161b0cfef87b11b9804992eae0333e3e0886af145bf66a2db23a4cccad0b50863e126e76c1286ba8183ca8e8f1b6750da5e010d4e1d6bc6e4e004965022e82ed9965c8fbbc67f767c5262ecc278eed55543494698e1e3c5f1e4d6bbe45", 0xf4}, {&(0x7f0000001700)="76f15be6dee0c93eb9607c0695c85e07b056bb7bb7e13522185439ea367b8957e71dbd01c6f92418ed89b71c3b505c6eaf7e9b5e31269102e746eb70c412f4b18043d49cd85bbde2f19d7d7cf26e7c976775bd610d66b5b75015b1692a770aa1a54d8679244a563d8ab83ddf719e58ad6d8598332f4e01c509b755207f753995894f4323e082ebd9", 0x88}, {&(0x7f00000017c0)="8c37bdaa83fa89c135594965f5aaf5dc9eb0f7e02fc1abdbf4b5f4d5068610d82667bfb02609a36c93f26e382c0228b797ad4e5abb1ea6c6fd35c6f7932b75a52ead97591473c61be6bdc86e091a481ff9971dce57b23d5088f82a39afd963f90983df5b4240dbf34974f9b2a1b49e5017718de58d7c758100a882e47e453015a02f", 0x82}, {&(0x7f0000001880)="42c2a15569234512073a7dc931b7354c786a0e43a4b1a80a3438904cac8efe3ec8c8db1dea38939500e8dcf03897", 0x2e}], 0x7, &(0x7f0000002080)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB="000000001400000000000000010000000100004cfd626c869ea600a7cef5e00992b01b5ede86029e5b55cec82ac4cde437a8d9d2d8991bbe340b00b47cd843346cab13a1d995935a9b577a7fdc17eceaec53bce21efe488fe2971b06e945f8bb9399", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0xee00, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00'], 0x58, 0x51}}, {{&(0x7f0000001a00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001c00)=[{&(0x7f0000001a80)="e8d0509ab5dfcc88c5b5c8f6cfa7d595e86b83bc88a85d480fd263d20b34870877ffa4a0faa57f9b11116167aa43e071b149f45362eb0f1ff54af962025f926d7d536449312928f3d3204bb62547a05e3a5bfe303cc7b55de066772eae485c90cdca854ed0ff71f1941eaa1481c5bf4676c37f68ea2f8a75e389c57d1f0bb6ea0926b8c084fc6066e79dc85a3f84d89a1960284263a1df4954c76714a4c2cf3f60f90cd0b81692f4018157c04db8cc07b1d2a0dd1529914316e9ef47da54d8550956f17892905e790d0c3d96c536d302c317ae43f7885f30658949cef01f76b8d60d6036b3b0", 0xe6}, {&(0x7f0000001b80)="44c8708141c231b8ee9c23742c5afd04b01c8453a9061e87aedee033f634610806e9b80a15143bcf8b6195c01d35ae", 0x2f}, {&(0x7f0000001bc0)="7029149d33d5", 0x6}], 0x3, &(0x7f0000001c40), 0x0, 0x880}}, {{&(0x7f0000001c80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001d40)=[{&(0x7f0000001d00)="6ea9e3e17600238cff8f2c4f8f9ce2c6cd8572eecb", 0x15}], 0x1, &(0x7f0000001f40)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r8, @ANYRES32=0x0, @ANYBLOB], 0x38, 0x24040000}}], 0x4, 0x804) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(r2, &(0x7f0000000140)=[{{r9, r10/1000+10000}, 0x17, 0x4, 0x200}], 0x18) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000002a70000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:07 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008ffffffe4000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:36:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x28100, 0x0) r2 = syz_io_uring_complete(0x0) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000300)=""/93) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x240102, 0x40) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000000)=0x89) [ 784.569164][T15702] loop0: detected capacity change from 0 to 1 [ 784.582530][T15700] loop5: detected capacity change from 0 to 224 07:36:07 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 784.613771][T15702] loop0: p1 p2 p3 p4 [ 784.618088][T15702] loop0: p1 start 10 is beyond EOD, truncated [ 784.624411][T15702] loop0: p2 start 15007743 is beyond EOD, truncated [ 784.631717][T15702] loop0: p3 start 225 is beyond EOD, truncated [ 784.637897][T15702] loop0: p4 start 2415919104 is beyond EOD, truncated 07:36:07 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000050000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000140)={0x1, 0x5, 0x1000, 0x4, "7dd032ed6388a5be4567eb5e713d6e8fe9be1353964a6e4a7828386e62e19e9d"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x18) getdents64(r2, &(0x7f0000000080)=""/47, 0x2f) 07:36:07 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008000004f5000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:36:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000002b80000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 784.658259][T15717] loop4: detected capacity change from 0 to 224 [ 784.742866][T15737] loop5: detected capacity change from 0 to 224 [ 784.745578][T15738] loop0: detected capacity change from 0 to 1 [ 784.756345][T15736] loop4: detected capacity change from 0 to 224 [ 784.799652][T15738] loop0: p1 p2 p3 p4 [ 784.804769][T15738] loop0: p1 start 10 is beyond EOD, truncated [ 784.811064][T15738] loop0: p2 start 16057344 is beyond EOD, truncated [ 784.817843][T15738] loop0: p3 start 225 is beyond EOD, truncated [ 784.824199][T15738] loop0: p4 start 2415919104 is beyond EOD, truncated [ 785.199283][ C1] ================================================================== [ 785.207613][ C1] BUG: KCSAN: data-race in internal_add_timer / timer_clear_idle [ 785.215630][ C1] [ 785.218044][ C1] write to 0xffff888237c376e5 of 1 bytes by task 0 on cpu 0: [ 785.225411][ C1] timer_clear_idle+0x1e/0x30 [ 785.230098][ C1] tick_nohz_idle_retain_tick+0x31/0x40 [ 785.235635][ C1] do_idle+0x1e0/0x240 [ 785.239709][ C1] cpu_startup_entry+0x15/0x20 [ 785.244570][ C1] rest_init+0xee/0x100 [ 785.248980][ C1] arch_call_rest_init+0xa/0xb [ 785.253942][ C1] start_kernel+0x5ae/0x633 [ 785.258446][ C1] secondary_startup_64_no_verify+0xb0/0xbb [ 785.264470][ C1] [ 785.266991][ C1] read to 0xffff888237c376e5 of 1 bytes by interrupt on cpu 1: [ 785.274528][ C1] internal_add_timer+0x224/0x270 [ 785.279825][ C1] add_timer_on+0x262/0x2a0 [ 785.284326][ C1] clocksource_watchdog+0xa74/0xac0 [ 785.289531][ C1] call_timer_fn+0x2e/0x1d0 [ 785.294011][ C1] expire_timers+0x135/0x240 [ 785.298625][ C1] __run_timers+0x358/0x420 [ 785.303120][ C1] run_timer_softirq+0x19/0x30 [ 785.307976][ C1] __do_softirq+0x12c/0x26e [ 785.312460][ C1] __irq_exit_rcu+0x9a/0xb0 [ 785.316958][ C1] sysvec_apic_timer_interrupt+0x69/0x80 [ 785.322570][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 785.328530][ C1] acpi_idle_enter+0x258/0x2e0 [ 785.333293][ C1] cpuidle_enter_state+0x2b6/0x750 [ 785.338531][ C1] cpuidle_enter+0x3c/0x60 [ 785.344261][ C1] do_idle+0x1a3/0x240 [ 785.348330][ C1] cpu_startup_entry+0x15/0x20 [ 785.353301][ C1] secondary_startup_64_no_verify+0xb0/0xbb [ 785.359271][ C1] [ 785.361597][ C1] value changed: 0x01 -> 0x00 [ 785.366255][ C1] [ 785.368595][ C1] Reported by Kernel Concurrency Sanitizer on: [ 785.374978][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.14.0-rc7-syzkaller #0 [ 785.382947][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.393201][ C1] ================================================================== 07:36:08 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:36:08 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000060000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:08 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000edc00000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:08 executing program 1: syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x8, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x26, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:08 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008fffffff6000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:36:08 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 785.531190][T15766] loop4: detected capacity change from 0 to 224 [ 785.537048][T15768] loop0: detected capacity change from 0 to 1 [ 785.546247][T15769] loop5: detected capacity change from 0 to 224 07:36:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bfffffffda0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:08 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) preadv(r0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/33, 0x21}, {&(0x7f0000000300)=""/191, 0xbf}, {&(0x7f0000000140)=""/32, 0x20}, {&(0x7f00000003c0)=""/136, 0x88}, {&(0x7f0000000480)=""/103, 0x67}], 0x5, 0x1, 0xbdd) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x8, 0x0) write$binfmt_elf64(r2, &(0x7f0000000680)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x5, 0x0, 0x10, 0xfdb, 0x3, 0x3e, 0x7fffffff, 0x42, 0x40, 0x19a, 0x6, 0x4, 0x38, 0x2, 0x8001, 0x0, 0x6}, [{0x60000000, 0x8001, 0x5, 0x30000000, 0x80, 0x80000001, 0xffffffffffff2de4, 0x293}], "8bca78c4c8fefc70ef6a1587df14b4edeffb254c24e60501c7426e4743d9648623b21fd587a2d1e7a1e2172d99a7b7322df55df27252a540536270ec86c2ef6aeb57b8d5d6fda840cc6ab047727bcbed381430b9a6c7f34ec8d50cef8719bb0c03ad3ac5d92e00ea2bc5478c1feb135728c665482b0acba2c65d74c1d3fd45556e57e5db36da2161621a9927b10d7536e823df45"}, 0x10c) getdents64(r2, &(0x7f0000000580)=""/218, 0xda) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) readahead(r3, 0x5, 0xcb) write(r2, &(0x7f00000007c0)="eb76632a445a976c09ab075cce86eebad5b34ea454c66be128e53bd6e9f2e89069447b88b8c092854b55f0cdbba813ec19e26cfb0c4f29bce3fb1d0ac4864545dd41691fdf354e692155e189ac28de2b31ee044b7ee6548682ae15d74294285d", 0x60) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:08 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000004060000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 785.579460][T15768] loop0: p1 p2 p3 p4 [ 785.587126][T15768] loop0: p1 start 10 is beyond EOD, truncated [ 785.593367][T15768] loop0: p2 start 16187391 is beyond EOD, truncated [ 785.600277][T15768] loop0: p3 start 225 is beyond EOD, truncated [ 785.606519][T15768] loop0: p4 start 2415919104 is beyond EOD, truncated [ 785.672794][T15790] loop4: detected capacity change from 0 to 224 [ 785.682310][T15768] loop0: detected capacity change from 0 to 1 [ 785.705429][T15799] loop5: detected capacity change from 0 to 224 [ 785.714638][T15768] loop0: p1 p2 p3 p4 07:36:08 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket$inet6(0xa, 0x5, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r2, 0x5000940f, &(0x7f0000000300)={{r1}, "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"}) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:08 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bffffffff00000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 785.719068][T15768] loop0: p1 start 10 is beyond EOD, truncated [ 785.725304][T15768] loop0: p2 start 16187391 is beyond EOD, truncated [ 785.732011][T15768] loop0: p3 start 225 is beyond EOD, truncated [ 785.738272][T15768] loop0: p4 start 2415919104 is beyond EOD, truncated [ 785.814882][ T1039] loop0: p1 p2 p3 p4 [ 785.819017][ T1039] loop0: p1 start 10 is beyond EOD, truncated [ 785.825118][ T1039] loop0: p2 start 16187391 is beyond EOD, truncated [ 785.831841][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 785.838112][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated [ 785.839772][T15817] loop4: detected capacity change from 0 to 224 07:36:09 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000070000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:09 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:09 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008fffffffb000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:36:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000003c0)="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") ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x94, 0x4, 0x800, 0x2024, "ed005400000000003ecd3e000000001f0000000000000000b5e92f684243d8fa"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000300)=""/139) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r2, 0xf502, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000000c0)={0x8, 0xf, 0x4, 0xffff0001, "bbe4c79e3fdb5a1d5848fb3f0aade69f032719b1e6802e6b046a5797d73f42a2"}) 07:36:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bffffffff60000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:09 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:36:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000140)={0x53, 0x66e, 0x2, {0x3, 0x101}, {0x400, 0x9}, @period={0x59, 0x2, 0xd0, 0x3, 0x9a0, {0x91ef, 0x1, 0x5, 0x3f}, 0x2, &(0x7f00000000c0)=[0xfffa, 0x2]}}) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x18) getdents64(r2, &(0x7f0000000080)=""/47, 0x2f) [ 786.432110][T15835] loop4: detected capacity change from 0 to 224 [ 786.435305][T15836] loop0: detected capacity change from 0 to 1 [ 786.443053][T15838] loop5: detected capacity change from 0 to 224 07:36:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bffffffdf90000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:09 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000080000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:09 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = inotify_init() lseek(r2, 0x1, 0x2) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) [ 786.499058][T15836] loop0: p1 p2 p3 p4 [ 786.507179][T15836] loop0: p1 start 10 is beyond EOD, truncated [ 786.513774][T15836] loop0: p2 start 16515071 is beyond EOD, truncated [ 786.520384][T15836] loop0: p3 start 225 is beyond EOD, truncated [ 786.526537][T15836] loop0: p4 start 2415919104 is beyond EOD, truncated 07:36:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bffffffdfd0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 786.585640][T15836] loop0: detected capacity change from 0 to 1 [ 786.592253][T15865] loop4: detected capacity change from 0 to 224 [ 786.621612][ T1039] loop0: p1 p2 p3 p4 [ 786.626086][ T1039] loop0: p1 start 10 is beyond EOD, truncated 07:36:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x8, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000080)={0x4, 0x16, 0x1000, 0x6, "9170a46f13fa337e240fa87527fe253911ff1e9b0c17280392f7032ba63b6fdf"}) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x2806, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@debug={'debug', 0x3d, 0x9}}, {@dfltuid}], [{@smackfsfloor={'smackfsfloor', 0x3d, ':'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@smackfshat}, {@subj_role={'subj_role', 0x3d, '/dev/bsg\x00'}}]}}) getdents64(r1, &(0x7f00000000c0)=""/59, 0x3b) [ 786.632218][ T1039] loop0: p2 start 16515071 is beyond EOD, truncated [ 786.638814][ T1039] loop0: p3 start 225 is beyond EOD, truncated [ 786.641941][T15871] loop5: detected capacity change from 0 to 224 [ 786.644984][ T1039] loop0: p4 start 2415919104 is beyond EOD, truncated [ 786.671298][T15836] loop0: p1 p2 p3 p4 [ 786.675591][T15836] loop0: p1 start 10 is beyond EOD, truncated 07:36:09 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000090000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:09 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008fffffdfd000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:36:09 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x20000) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) [ 786.681704][T15836] loop0: p2 start 16515071 is beyond EOD, truncated [ 786.688374][T15836] loop0: p3 start 225 is beyond EOD, truncated [ 786.694572][T15836] loop0: p4 start 2415919104 is beyond EOD, truncated [ 786.732057][T15883] loop4: detected capacity change from 0 to 224 [ 786.796374][T15895] loop5: detected capacity change from 0 to 224 [ 786.838646][T15904] loop0: detected capacity change from 0 to 1 [ 786.869532][T15904] loop0: p1 p2 p3 p4 [ 786.873708][T15904] loop0: p1 start 10 is beyond EOD, truncated [ 786.879949][T15904] loop0: p2 start 16645631 is beyond EOD, truncated [ 786.886524][T15904] loop0: p3 start 225 is beyond EOD, truncated [ 786.892732][T15904] loop0: p4 start 2415919104 is beyond EOD, truncated [ 786.929423][T15904] loop0: detected capacity change from 0 to 1 [ 786.969622][T15904] loop0: p1 p2 p3 p4 [ 786.973826][T15904] loop0: p1 start 10 is beyond EOD, truncated [ 786.979945][T15904] loop0: p2 start 16645631 is beyond EOD, truncated [ 786.986929][T15904] loop0: p3 start 225 is beyond EOD, truncated [ 786.993277][T15904] loop0: p4 start 2415919104 is beyond EOD, truncated 07:36:10 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:36:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bffffffffe0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:10 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x8, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r2, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x5c, 0x3, 0x8, 0x301, 0x0, 0x0, {0x5, 0x0, 0x4}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x890d}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x50}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8000}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x44010) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000000a0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:10 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008fffffffd000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:36:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000000b0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 787.292468][T15915] loop5: detected capacity change from 0 to 224 07:36:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf00000fff0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 787.340254][T15926] loop0: detected capacity change from 0 to 1 [ 787.347922][T15928] loop4: detected capacity change from 0 to 224 07:36:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x1, 0x8e, 0x2, 0x6, 0x2, 0x3e, 0x0, 0x1dd, 0x40, 0x177, 0x8, 0x8, 0x38, 0x1, 0x4, 0xffff}, [{0x3, 0x2, 0x56, 0x3, 0x6128, 0x3, 0x1ff, 0x5}], "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1878) 07:36:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000000c0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 787.383794][T15937] loop5: detected capacity change from 0 to 224 [ 787.401323][T15926] loop0: p1 p2 p3 p4 [ 787.406327][T15926] loop0: p1 start 10 is beyond EOD, truncated [ 787.412551][T15926] loop0: p2 start 16646143 is beyond EOD, truncated [ 787.419176][T15926] loop0: p3 start 225 is beyond EOD, truncated [ 787.425364][T15926] loop0: p4 start 2415919104 is beyond EOD, truncated 07:36:10 executing program 1: syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0xa, 0xa, 0x0, 0x3, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:10 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) [ 787.450727][T15947] loop4: detected capacity change from 0 to 224 07:36:10 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bffffff7ff0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 787.509457][T15926] loop0: detected capacity change from 0 to 1 [ 787.528048][T15960] loop5: detected capacity change from 0 to 224 [ 787.540490][T15926] loop0: p1 p2 p3 p4 07:36:10 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008fffffffe000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:36:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000000d0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 787.556252][T15926] loop0: p1 start 10 is beyond EOD, truncated [ 787.562646][T15926] loop0: p2 start 16646143 is beyond EOD, truncated [ 787.569725][T15926] loop0: p3 start 225 is beyond EOD, truncated [ 787.575938][T15926] loop0: p4 start 2415919104 is beyond EOD, truncated 07:36:10 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:36:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x3, &(0x7f0000000780)={0x0, 0x0}) r5 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000680)='.log\x00', 0x40402, 0x102) mq_timedreceive(r5, &(0x7f00000006c0)=""/73, 0x49, 0x1a, &(0x7f0000000740)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000500)=[{{r1, r2/1000+60000}, 0x7, 0x4000, 0x1f}, {{}, 0x0, 0x8, 0xfffffff7}, {{r3, r4/1000+10000}, 0x16, 0x8, 0x3}, {{0x0, 0xea60}, 0x0, 0x3ff, 0x5}, {{0x77359400}, 0x5, 0x6, 0x1ff}, {{r6, r7/1000+10000}, 0x11, 0x200, 0xdf02}, {{0x77359400}, 0x3, 0x43, 0x5}, {{0x0, 0xea60}, 0x4, 0x1, 0x1}, {{0x0, 0x2710}, 0x11, 0x6, 0x1000}], 0xd8) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r8, &(0x7f00000001c0)=""/267, 0x18) getdents64(r8, &(0x7f0000000080)=""/47, 0x2f) write$sndseq(0xffffffffffffffff, &(0x7f00000007c0)=[{0xb2, 0x48, 0x6, 0x1f, @time={0x4, 0x5}, {0x0, 0x80}, {0x0, 0x8}, @note={0x6, 0x7f, 0x4, 0x4}}, {0x7, 0x79, 0x7f, 0x5, @time={0xd8af}, {0x2, 0x63}, {0x1, 0x2}, @raw32={[0x2, 0x80d, 0x10000]}}], 0x38) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r10 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r10, 0x8, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r9, 0x0) preadv(r9, &(0x7f0000000280), 0x0, 0xd9e, 0xffffff7d) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000000300)) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000600), 0x80200) ioctl$KDGKBMETA(r8, 0x4b62, &(0x7f0000000640)) [ 787.620977][T15972] loop4: detected capacity change from 0 to 224 07:36:10 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bffffffbff0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f0000000280)=""/281, 0x119) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) [ 787.714325][T15984] loop0: detected capacity change from 0 to 1 [ 787.716006][T15985] loop5: detected capacity change from 0 to 224 07:36:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000000e0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) 07:36:10 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:36:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x8, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) [ 787.792142][T15984] loop0: p1 p2 p3 p4 [ 787.796490][T15984] loop0: p1 start 10 is beyond EOD, truncated [ 787.802642][T15984] loop0: p2 start 16711679 is beyond EOD, truncated [ 787.809687][T15984] loop0: p3 start 225 is beyond EOD, truncated [ 787.815836][T15984] loop0: p4 start 2415919104 is beyond EOD, truncated 07:36:10 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf001fffff0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) [ 787.856965][T16008] loop4: detected capacity change from 0 to 224 [ 787.863986][T16010] loop5: detected capacity change from 0 to 224 [ 787.879792][T15984] loop0: detected capacity change from 0 to 1 07:36:10 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf000800000fff000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:36:10 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:36:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x101000) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x8, 0x0) fsetxattr$security_ima(r1, &(0x7f0000003180), &(0x7f00000031c0)=@v2={0x3, 0x1, 0x6, 0x9, 0x1000, "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"}, 0x1009, 0x1) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f00000001c0)=""/267, 0x18) r3 = fsopen(&(0x7f00000000c0)='squashfs\x00', 0x0) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r4, 0x8, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000002740)={&(0x7f0000ff4000/0xc000)=nil, 0xc000}, &(0x7f0000002780)=0x10) vmsplice(r3, &(0x7f0000002680)=[{&(0x7f0000000140)="e59eef063131079d70930a54aee084d961e560e264e4c1fc836e56457231fd4ee300a3e88624cc2144d86e58636f6753badb9f17ab7f77305d44b4f5d6a02e6a381c63c33dc2795e5c7e35ef1fedf0ce981aca489121bcac6d46", 0x5a}, {&(0x7f0000000300)="0b420fcfa8c9ea030a7cc2d441c1f23b6fae7668b284bc2e0791806eadc8857f31c921f81f7a9a06b0d73e909623246d86092b136d4e5842095cdfb33aa272da01abda583244", 0x46}, {&(0x7f0000000380)="7601e07addbe7ba28e233841e078f6db585dd054ba3f61e39146", 0x1a}, {&(0x7f00000003c0)="bbdf8cedcccef81dcb31096fa03399bc49fb70a93c0079f3cba7971882f3f4b71b338ec86ff943f2617255fd75642be52da396b10c8c64f895d101dae835fa79c5de04221b7afd06520cd5f8074c0f504ba65949390cd2c5c66b961cb31e700046c125cc3610ecaf0a577c7c1168ddae6930f863df7042412fe8a203b769f3845d08e64a8757a1084b846b09edc6c7f253d3de3fa5b3c6c0d4773d0193361fb1d34de096803eb395b4a6121accc96e36b4657b070ef0d8dd47eb2c16307ae6f27490cf7d1a92204d0cc70ed334cc2e0a2d851fd07e60", 0xd6}, {&(0x7f00000004c0)="6d0f0bc9d63f5fb55a5f5d4320fb523c3135efd106be94e98455765b52fa17247e3efd39f2b600b77841a09bc61d78269e7bd2a4172a0d5a58468dc398916f97efcee8d36e31f0112b9fc77329263c6cc94c81fc929ac471020b5ea4acdff7779c50aad0524291181e286d4a831993a3a524b699370af1eb8c01455dffe61835483191017c036dd26d9e6515d48b8e738195896098b6426670c03033b00275a90774e8a7758490aaf9f68a074d5a0a3eb10cf4a49dbbbcffac0d0a8232384273f435c5ee8cb6cd2385da7bb038bd1a6fb4fb166379960215b80edd19ee94f807e6a461fdcd6d56bdd9329c4be75f3040b7527fd10c19fe9df40700da5f471624adf5780c5030f147effe7e2dfd96d787165edda3e4a187f0d6160cca89568a98487344be7acfa898f301174b9c13ed53942db565eb76732ebf09c20f498fa2f858689ccbc491c5130b30851d59bcb6dd1df9f9fc41bd8a321a887e7aaecb98176e7426da2ed66e728c790d3e1e8a9d731a2a74e31232bb88f477853d9e3d58f586376bc8530ec5d07779ce14561cb24a3fb8d2c49a384c684316da658fc856350b99177d554fd276f539302a76a364e8fe05ea4cd35bb13440ab03176c46f0dc408bf5299e17819a03cf288480398a4f48ec3d12fedc02747ccf148782fd848606d0af34d379dcc33b8445ee059d9e4f8363b6c9db7bd687b63c120d8e298e19e2ba0ae9c5907606833e8f577c67929a8fb6e33fd34384c4262fa331f3be6a4ec418f113c29574d5d16c964a7d1e0b31ab62400e2db1840e13fb0f0824795bd87faa5d2f4bddeb03fe3c24542f969c69062b9c69f9cebe4a33dcaee505c1e523ec28c3d03ca072e59277cb9f760008c94c5d462c98c3bff2c702d45f3936ae1cb21763669913ea33c994124c5a1764f67159dc82f360691e16053d66a6c6b3a218288b40f68a4977080a8a038ccc341f828c96a91719c1d58153dedc096e1b0038a9d63c8f6474d05caef68630ffe99601f6252c348f020d9c492c286b996fd380d9edb9156baf6f13e2e4e8121171051b8f3147eb15e04d846cb7f5f07b47a6c46c0b2b4e6c26d07e4044606899684025d75fa8a4819022148ec1c18fbeda86d054a46ff5a167099ea1dfdbee0e2d1f49db7b6aaac4ab2de4ae8685de7626f2d60c600e7b846e5d40b047f76854b9132aff7c6948497adf0bfe17839c46bb495f7f37ed9aea16ae48b109ab7cdc48fc81cacba871c49149fc9e4254f50099503d911cc0fc415bb3f3df4e717326894249677c4edd0d42a93c8ba35bdcfd0fbc5e0e24a113b874754e9b2396235ca3d09b1224ccfd81bd6300878438cf24e3a294a867c480858b4d4e8f92fd67a7e2362bac8ce86f4aec6847e2eb95c389f570ce6cbf793bf9607a876a5d83441ee4ae8b539e88f161d4f285ed4874b069467c9f330d8697be8cd587b5962e99556346abaeb9de8700a0677c8158b0a65875a8cc1a01fdbf261b94f13d1341fb1a0d23730d67a24cf715e4d8b32962d9739433f0f90f4ee48788e6b1299d8c227dc5a9558cd53b8a520b249a53bdd520f76e9ccd35e841fabf50fe1e9a5693eb2fe14aff42be0a311eae3cddebe2fd6ae72a0c1473de8e3ee69962b592e9bf73003245b37e9f4971814f6fae03e872eacffe09eda797c82cc81140e561e0d2f2786716e7fb781d6fd202a851fd812957087f8ff95fe3616d706650dbcb26fb39d8ee3000dbd500883f78535023eecb3316c4944d8f1226fc597eb6fc5a2f46ac277f66c9aaeeb2d9a4177780c4d10349f8c0fdd7179394133ad9ddfd10f1d440e589c90935dd24a059930d296691a09db4559bef81eb4843fbd0fc15720789b08fee769ef147358dc233b7dd1e657edb6aed8efc61c67c0efb6629c6bd9c3c734a78b0c32241fb64c4d40d52681f8d076a238a1560b824a7b0238965deb3256e883793742ddd8dc38ae2648ce05ce552c6b6b19fa3b2b3ab98284ddebdc7d10b970674e790de8852e9137d113c18c83599f30851138d1bcee0de901ff5fb50c7a4e229086a11df12a7a81c3ffde47d19adc1c6951ee9120886804a595ba9fe05a0050159c4075425feb962ee1d201cfbd3282cc11d9bd241e4f26c339e9462f1bd580dfccadef0343e02bb429fb60b43bce4de74ee4b016a4e196513a35af45fecc85c0ffce39116d09eda658149c1f923881e7170fa5daa2ca6e29dbb64f9477feb81477c6a5a93306318df0007cb12a500bde35e6a822eee3cba223ba2a99dbf1979e19ae9b8dee2eeec160f314ca5bac717e3d0a8d9b9f09a5cc2e996b8e36ab0cf38ce3f3f2447189f0abe8f597de43103ad752b9cb3df1fd4a19f2257ff60e929bf0745feabc17c0100071fa145a0cbf66ef7dfc20fdbd0c4a7afc83b45fb434894274e176ed90579e3dccb1c473541b05ef0ac0b9f62a5c6b79591d0acfaf8c00953291a31b7c25e363c5813e530ac19743852453bbe616ff5d8dc941d2e18dbab61670d539054a16f1b117f32f0c646b593930ab8457ee81c2372a883abd3cbd9ec0cbbd46df66b6394ccb2fddf7cc2bbf25d50017c2079a68b7d8299e85489f94770829c2280f6058b86970f0c1438105aa366b411e660720e47b4f3920bc968d11144274665bd7ff33feba25dbcf091752ffdf3b8c0ebfd08e372322f83d04cc0f449324dfec3c35489336d3905a0512417823af4442d1212473fe96c5ad0f5f4abb85ee697fcf3071efdc2edefe68b868353fa12ea43bf9c4492ecbd508e18b0f34487e4e8232dc63ccfa5698559a94c4bf6c892636b57960239a47ec8b6dd3c7e6f9681c732a6137ae39662ac9863bb07d4b25904a01bfe0e64aaeba594aa52c0a52e4e3c73ab0da0122e10366aef387d35ed312173966b6cd824141acfb0c673a5b16062bee501a08b56447268eac3ff144155b750c60c92d25302e0d586c347824fbadf0f96c6a87856c21416a69519b1678f8eb3959aee785568191003ef4ad7a4b6cc29ff281a8b71d77080b7b3d37b9341ab7860dae79ed76abaccec740745cd9192256d46cadd96ba4df541461d9f75d92f9b7e274dd0b358ba4d1cbb7fabb29e0d232e1add59e5e92a3e2e5f77d9a79ba1b93895b1bbbcdb67d081753e6236e8fe0152f1e9ea4cb3d5345ec189ac352141aa0cc47f20395539be27e88b6f3de0316e29e7f0801dd682762b09d8314fb55569d1c86b7a447f8c6b9fa9bab2962f5b05a83b9f530475e2148c8915cf81ff13e3227348e60e7158ca913d4feb0ff3aa05506287b30d65c579c05cd112085627195377d14d854e057bbc13dd30cb03b3ee8c1f1f7803001c540dd9088241b02ad4e8735bc5a76f9ec0770ea26c42bb30fecea61920691caecea496f9031c239fe94d71d09e3644a24a6dc36fa7e889ac0f0d2c8de57e532d76be4ac508c2ee0b38b1eac963c5ea43463cb1c9bac1f5d0352705bf5cddc891cba8bf2233bc99ff7f3276ced0ebf1b3920f3fa49e1f0c5821ac7780531979ccf846b072321af6d3fc0a36631b19d08322f5530bbcfa33e504fe95f8ec593ff58ae33f6ac664820e44807027daed78a6776ad7c13718e6b24870f0c52d68336618f122fcb4c480721aa2edce8b115503fbc47fcd9db3692240a95f42ee5093ca0217dd33187d725e029c529b2c32d61ba3b53ecc6894cf88ce2cce5a67b031e66837c4e88f8ad0a4cfec9b84ca64a894c6a7ce7f37d17d23d5e2888689d5ddd98df8f443909e642fc7693a7f3d3584eb5f95173caa647fe185eaedfd27e3a8ad8c0d6cd8b0fca0d9731ba0ffe0e85e29b33906cc15c3a1fea1ff59631f26d900eadb566331494fa965cf167e14c4f6d895baf297c6ea89c2fea84d0140a75c716b46e3bb37e0cb85b8fb941658bed345b96d4df540c3ad1b4042d413f9d667c5c46913f2819529cf642b4c66ab45138c124662ea1d6571a63d5e5ec90cc417b6d5d7e2b069d2ba9febde21ac8209cf04e78d3085339cc382c50b8bd71b3ee68962bd4e2c03bff4142e05287f7c438952f2eaa24c71f9afe087e98cd2b902b44c47ac8e701c1ee9385a9698489ee73c9d8612f1767ebfe6d54d0b8cee883f46bc2150bc9d0136e46145482b6f94fa2ea86bca48e0528349697f29f0ee8da3fbfdacbc672a44018c9834fcbb3b8275e8246aa0eb9da3b4b08f66933b1802e004b3378d41880ec5ed76e6155a1e0a8ec49978f87ec2a6ec7a4d780ce936e73073c57d2cb3f6b4e98a73107079eb37854aa7de2eb58ba4c18ddb93e5887994aceb4904033356b82ecfe5cc2b0b38d8e319ad017632cdb477655ff769eaa84373d7df34d26896a7b664f1d9b32d2fb5fd77a9c6147b81d0762bdb4c625f75c5fbd6c84a9700629f2970bf8cfb6fa7f1ebc2087eb6c80a2637a4f913c4fd15d8bb391435325569b1f408f461f71167c031a92bb71e6ec58802d132a84b5cc5b0d24d558fa90fa53aff3101773ad917ffdd434281a01e59516a59250ba48b19c028c530bf48fe605ec5e14b05d2c51d2163bf9eb3ea89cfbe148a5ac5035723ebb45c515b2e887b287359807b0117057caa74cb5a060d79598ce8c3596f9be4f4e76851926d3b0e610a1c42b7b38c266c6b1cd25a94685e5b33cb0f5dfd6ea0cee033d7b44b076688449b00f633e46861f3d69f820ad04819592d71e5268e2b5eb2e4038958da64170320cb2e0de7ff6d3a4c6c9927692f813179639926b46dd7116fe2efaad0b3619cfbe3d6e079b73399418f35978d40264c45b101600e687e58b0877192a84a9f500608245f2ba95beb474b5a981c72cf239a4553c0c01d2bd7e87e029acfd79743a2bc10caf7dfcf80d635e2bf2e4242fe81f60d0312f456e667a600cfcd2118467f882a3323085d4a7ab71b6294705a0ea6693592a57e1fd5b0074b415ba5eea84ce5f05d4cf60a2851e2634da5073a0e49a68b08f0a045c367961c17a30eb03eed2e0c84de30de2390d31cda4d8e92aa749c6ba8a119ca6769c88fc2bead60e7cc000c1939f015b6049d77a0e8aa1a39d30194314ce64866a70e2cc493de0d07d013863f4499b9224c5cfc071b8050925198d81844cf30e100c9984d1e1e190ba489d41211ecf321b84e11a5357474ee778ec95f5a0e641ee2459268ed466ff63212dc0d98e74c9706b2fea4605cc105affe720f076e1d32ca7c1dc32ec429331473f980ef751ba280ae937e1ba04dc21eee1f6f3fbcdba54820cce222cd6cb2bd0df27cab03df19efe65cc9d9f359bc3f924c2849fbc3965eb0e970cb46646202076046f965b0c8016825b906e3a7bfdaf5304d23fdc8587de08c72f2e0066c0fc0e1641fef7d8906e8373b71f5790963f8d3979e9e58a4534f1b1b3bac5374f5796e30c5c27d89061cb318917dc1eb419103643c24a5720760cc001b101e74b94f03ac37c891bd3102143a3dec6bf6ca2982222339812174dec937167c8b6dd4094b643fb03b4cb35a5e01ac7951e41b018742b2e0cd26f96d9a180bbeb90fef6ec2aec7bb023abd654f63b1079f9c6717386b38f699309b8f0ad8087760e2d1dd0b590f75a86a9f64a387f2aff5a297ad99aeeec6878b85705963317c3d49a6f5cf982772551c347eb85a23491ab163bf6d01e5295b90a16178051379435fc564f177d1a5e70be2b94906e29a69ffa855c82164253c98470402f5919e274a7bebbf272cf27d9e8d60a0bab435de87631cc4f35876d6e42f06b7045c893bf8918e2cf6a0fce8d35b6fb1b08b95bbfadd2b0b14afe4982d90515d", 0x1000}, {&(0x7f00000014c0)="250dd032ee4f5a474df6556bad7108551f681b4457f34c7c8cf9534e19b848ed2b5925d7ae6152025c11f491b917c6a826ff0940b1ed7d0918a415431d1dae0c601de4271ac033c897d2c4710d83c326f78c1184a00e951022a948ea2ae242bf0f70b0ed567d04f219e68d98972559590ab27aa9f550293f56a93438b1c1a6", 0x7f}, {&(0x7f0000001540)="2c6bc0ab9ae1e83fda96158ed8a66bb5d8705429a68b913861c7e6a6a0923f4cc340cc06e831c161429f05d862d47ff35e3773f9e6efd8b287007c77ca0bce7d72a1d6b7977fc7bd47da821d96de6145389a5bffe40798c6be5a43c38820e79c9455996ff7388fc5ca8ccf91f8b5467b8bdeb676f26392478445df7df6f0f8bd023d7205795fad9995b60a64f2653fff020180114d229fcbd7e1dda0510ec22e29fda977e3c90592e18b898aadc2f78e51f86e4d00aba6b06010acf5c41a1c1c79777076b0fa931ec0c85bae9a6ff8a1afe88b57e5d83a9e3290712893e19ab1dc1530d7d726ce54ac5d2568cfadb5da9933107ab685148dc457d0ada2e4c6debbc60d3401648b0a0393395e3af7efd69bb4ad738c6807e1ad74af204d91b65a239a1e1ce5a8c64f9eb02a97ae402fa663fcab05fd82625df14d780e50c3b750d16991826e8f5977172b876e27c0ae652b0c4fc47e1e0b4d2ea03db49ad328073b073382723a24cc4477b5660ca2d24b5b02567e9853c830264392e20b3c150cdf7d55881bda6e7400cd4bc2185fefa013ca5ed62ab6f7f49d97ac9c0219afbaebc228ad04cac12d2b779c92d53095254bedf002eeb9ae3599998fe614e8bb881d7eef0e49e97f021f12c0388b7f14f948848c205b4828246f1ed7182ebf7cc8d49d38e69e33cf9009df01797eb34ab6f534097c53631f22a2c5156e56fa06dbb14895627d1296091e7e6f9656c8e4d01e6cb38b3e1908a14d21b0e76a9b15d4fdb675e13b233acc52baf77247441ec8dec4a8b32c07520f3ac9936c57bdb0df94ba79aff71668f0f58872d1685a7531f9c6babbc2c5388eafc9ed2e7ae35adbd1ecb8eaa6665ee5e3432f155b058800788f31d90e037385942b1d56f84cef968b28093faf5ab40bd02b1bf4b78a2f734353763b77f38df6747d4516cde6dd6241ea82f656f2743ece20b5427a635fe75546c20db49c9180886e3a24b2bccc2a7ae45de83a7d7e79c1682b879c5b634766d3f5e272db300348fe8fb628833d1737ba8a057f08e2beda7a83ca7d6dbf7fca54af85083efea671e780538840e273b39facec4659f601ad2b50c2304d8958d32095950e24c2f719cb7333b173e55d478fe36486d137c96aa8cf4b56633dc4bc890e5ab976c26d5cc4e38b54e1f5fadd0e9b7fdafb5cfe6c5f32631a0c984a12a4352f350ba42d47c53615b62f3931f806fbbb1f4ecf3c21e927282569b9f68f7e5f4452ae480b5992647ca71160ac9a97ac1782d5531136bec3cb9727f35392372d06c112b7a658483a6cb76eda00ddd5d6e5cbd16ba421fcec6dd77c4c096e91af0014613fa2df0cd54f15a36b9aef88c93447d969d5f73ed447c78508272dd162f63b03aea4bc544b36c4b16743c4bc5b11bce15031d094c0a816182451e19690b5bc77fd7f56861686e42d28aa42f301b44fc96c291d0d7955831e652d60a4a19aa6f48e8f9b3d1165abecd6a6d7c22fde7f8d27e20ad903feb3c56d2de2d3af3eacaef5a6e841c1fe0bd32b1162f46fac8e8806cb4d5e3e623e9e98eb2fe68befe3fa1dfec482cd885e20e74992a707b242cc15c2abb65b8cdd9aff589eac923ad428ef1d5dd2d092c33b3eb7ad045f9b678d7a9bc55105acc1c5da3e70434ad91ed4e48ddbca2b1a884707870d0ce7251c2902ac2fcb1aa3c72da0d3c7979098ab035f1b6d0f2a665032571df5277b5567734723e60e2230549ea3e42a2162d738ba5efd001494cd93b61b934f37101250f00e7ed0d84802c0f325ab963bf8d30549d7c5af16aa8e8ff47a653b638ce7a731b5cca00bc891e943147ef10400b650e049f49858322c124f49e011be8cdc18256e50f7c7c4adc00f333d7acca4a1bab0906fe09a902c82f1dca4e86cd92f478e6cd0206c0c3f6cca53f566127978eb8c2f78b3cdb1c6a220114b8bdcd3d149d9fbca2a1545fed6e779bb6a283d15d705c32e8d1fea0cffc3f847e88110180c0bf159c52c1d27f50000fb40bb5f191129fad65fa9dc598eb7c0b74d0cc325d47bd351ec0d2d45262192192c423b1c30c0574a7165e0d0d2005f98dac353b0e67a3f8104953750d00928e69c546bce04af7ea0b64b8bc942b44a3e7bd638e5ad8bcc94bcc3df2bf5860aaecb7d3dd224079667c70b4400719bf303806c20c3a470eef9c29b83820bdbfde9f7ea64a148e7d395d9755ade3455de0407ba38488fb9b641326c9ff9b11a7777b274b4c7e0c6c92aa443fd895f2752f7f9d5de61830be16103a142a744a642be3a782196a6450ec25736f2f06c947595e967c6c94257b64d862c2235e5084e71ef2c7679c6d86997073b7af0eaac8e507e9907bca2fee7ce08911d9ed26cf1da1b98c0bcc601b2da9b872b28fb211263efb068eda218f547359e0b1bf726a3ef9ed9fba61ff17997d3ba958b660e6a25c133f57de845830201cdf2be6bd259fd446cfd27d8d6989c53d527fa8c0ec0d5eafcf0d35b7e4a44f2bbf74c8e1cf3bb81c5b057ba9118a75fe8dd6873fc0e17bab2a25afc27b3c532e1ae0b2e116ebb9b1105ccc6048b5c08ed01d3b462f9f2107240cb14900abaa3fca6af7cd73908266a927002eeb7b655c73933b0cdaec7aec38604b7ee459a03ed46be7c85d2e932f2a8e3ab5bd19077ae30d19bbf0c7e21c760c9c75c12afcd20c8db338113669ae91e17aa8c4b4ea5b85834852ee95f307b098e9e3428605ecce93a001dea081d233bc26c326dc76898bda08faf11d947f5c7084b33d2d346a7c697f34e1778756929537ad190a814e765ae3b08712ecb71aa447f1bbca3ac18b86c73dfcad54dfe49cd82ac741122ebdaf2816419417f55840933ca2f5dc970fc1dfb8d090191491501fc5555aaedce1486044fd441c744eb84d28de304b58c2d048905163a5af6ced31b5371252b12b2800c8daa497eeec1eb47068590f1403ed1dddd4995477b41447a9231c1062fc5e863c716b4df5e4f3ffbcf83747a35f22ebaba7c7944eb95ab0c4d560ca647eeb7597089535553b54d539955932bfb303bad98a803688568a9b09bf1eb2428fefc3112861a21d231add161cd7ebb45b20a4ffca59bd4e442e955685fcda45c5549625315e3defb84becd4e947169aa3f0246d16e4c52698b6d4d5af6290a3898332c69e300e03c336baa301e16d5361c4ab68a7a605b42eb711ce8b2c4df2709a319012f486e54bbebcb6a7a7ca24089ad5f723e34d93f124b0be5a5cbe5f599f73e0ef0f9b2f937b71af29c8a49f8ea0caca73e731ac3eb0a764b24b6bf4a179413f42bd76e5074b7199f5672f21dd11d52668aefb67c169ac1dfa2d865193acbe09eb33491374e9cc3c5d6237dfe7c54055783987a8fb609d01477e25c579d662bc8d2372be64691d2c01388ee54531dc9c82b24655a1f7c51dff65e812dcfe59ea68bb876a9517d39bb5595e7cad77bd46a1bac84b343349c88172345f47863d8fdc3535e5be9fad89b0362bbea1ad2cf353c48d587de2f1a9edf0b1f997cdac1524f9013b23253c95f09c44ad214ccb53fd07de9fe53def8f67fc4cf2e6ba179a0e9aadc64d18aa645491191c96209c1030a4c6baa16271e3931e2155fe0185c704b862aa1475d7fdeb8eb73ac8c8c4655866663db4cb189aa9ab072aea626141dd60ae5c5086a2533efd1cf78b78a73ddc978d6b71df7638db0785ecd0f52816ca709443a854964f13d6c4862363658e9a0447ea7394bf11870c4f2928480a3da984adc65148896b4192c6e8a5b276b41032d2df9b961e444e53e9ba0d560aa7311aa1326466682d76fe89ec0feacc2e73cd334b7edcc106a7c5cc4adb33b43ea1ffa0bd4f23f031ffd91583723321e5476073ff406f5482ea7a9a9a9a173435888929b8bd431c96f320a0750d429736955b8167c5be3eebb4b2dec48ce46de3b5af1501bac2540c5743a098238ba9d1e3bbe8e1f4e26f30513ed6de712c45cd6e7e848f069e475b3aa9b8d556126eacbbc9df0b50f95b77508c2240be0b9f6295567a39747f7e2a8c170e78ef95db08f7e314cd0362553d8f8cff8d91bd08ca32638cd91a3e961de0a53b8e77a6ec5c0a181495686912f0abc2261e25a744449e3523eb55f533d8ea3b9bcdc9e3027e24db30ec76f8ad4bb6bd877861e6e1b9718717da2b1d2003ab7d85b6cbd27c63563c72629c1084625afd401d98bde4b761bce0b8254b091e68dfa5a4002b992c682998ac1ddc3537b0159e9f59e4ffbf18ba2ee8585d9b55bb796fdfdc76b3c6e7cededbb072610bfcdb338d63672d0ff22cc6167f9949e445032f8c4c4a3b0f9e8dfa5944f48ad57e8b92f82e510b761729a19771a27c2f667ced888b9e2f9981ebc6f261f838354beca3409302379395bd0502309d9f5c139529539d795f9c6a73f66f6763fed616c919e523072fd9a395b961e5bdc6b9dea89985ae2dcd396f091e2e4b8c22293c11fb39800d7de1147cb2391b4056fe7f530ceee6fa0cacbaf472e8a66e8fed83e15676202b34efded3278173295bdc48c3a502e11924ce50fef299b991560b1b315a56bbf3f946d3fa802ac7226fa8391f836380fe3c8ebba997545ce45c902aa808cdec1a6932a115fff9e4a74786ca76fe3451d0a90fe1eb99ca8e76a1e9b9a5236d25d71df4d198f14332289fe7fa86b733683f95a0cd256844f3309ff1ba015e0acff078ed0f4f4b397d35367abe941f153b404652e68b28e1f6d62556aa0117879fcfc3a822bba484457e9f3b55fc61b0833a38ccef2714dab06f79440ef269b637fb5d153b7f85a131cb605619b7513d60ccd913958c87be5454ee27e8b5871ab1f3fb3ba7f38814cc82e75cd2e4e7415bfeba29baf378132266c7a77aa1a3baea765ca203352de75814890c04825a461c0b242cd2f3a03af3c866db69385146cfe9d35721ddd80cd84fbf36a046bfd20d9840035ef88ff893ea230b6a5f2db90ad542cac3ef84fd5980bd36dbb675c2a0fe889e1dd1f276e291e2fe3451ef502b438a1a9709c5b4d7be8a5d574f6bff4fa23a742153fb9d63c68aead54aa45ff15ce6f75dbddd9d800c5f08c15fb56e26591cd116a7eb5905b27cf6904d2368fa2aff5f0d0573814f922be0c009d0e3fe4386bb67018754f6b68a9c069979c517b03a2ae9b54d94740a53ce573e7ea5f0730afba335c8caa5bca0eee1bcaf7f9e7c42e04d37140950c0744494d63e02a8d18d8d277ee5ea1d04b8234986358a5383825fe6cff5a8a0b1b2db4c93f541244a02b725f994954b56fa9fc51e778d4d3bd4c7b29c5585e8ca823583f2bdff648d134250400c13890a78fb48ab703fdf7b8954701121ab38ead8926e774e04a317720dcf36c83b5bd97e4128223ca5fde5de6761456375a04e7e2bc1e964d0694001eb0989a37f562db9958ea1a617e338f91e6ea18ec2cfc36eb40a68ae254e2deb9290f5122a71dcac79b0da1da1789f9bcde70691dff04d39476d8e818539932ae14a96cff1f7f17be585f36706cb1c3868546844b97d969e8512cddce1f4ad51075051fa30c503fc0ddfb5394e9669500a3aee6f460fec375f72f0d1dacfe4cf297b66291adf76171e45bc6dddc27c79b038cbf33b68ac301e2fab46c8b48c407176fb9aa60829f5c1cdb64a3d3c815f4e36abaac650bbbd1457265be85a165f6a544a4aa9dac6e27afb0b0d7fe36fc8cb35d854d8a670575bd03ffcdc2e99a54447e8245402009253441222288affb97532fd2e205fe4e572d3826848a11202b15b0180573e0729d754132024ba4c9723c8d18", 0x1000}, {&(0x7f0000002540)="56469ec4e73a3b0333c4806feaa12ace2ced9032811b90a90f8af7225e26bbb3f137830369cce90012db9afe98d8461e34b6da95ceeacc8c3adc1eb005ba7a0725ed324f1e2a6b8f58069bc5005a88ff88163cfb71dce4eeba4beb53def7a4d241ccd6d85136fa7b34a66a2263775088ce2c79ca669dbf5cf33dc3efee778bcfb66e71826a06c215937e0b1b020f9e1e33836b7a9706e78eeb73a26b4900eb05be85cf04c5c4ab0477cf2740f765082f19a9ec0f6a5ea549d069ca178439b6a4f1b8751290db64170fce03a2bb271dd6ea3a0e215ba405fb0e98c043d80d505c4ebeee7495346628db6df7ec79279774a8", 0xf1}, {&(0x7f0000002640)="b1fa58475e9c54db0976921c04cadca120294b1d", 0x14}], 0x9, 0x9) recvmsg$unix(0xffffffffffffffff, &(0x7f00000030c0)={&(0x7f00000029c0)=@abs, 0x6e, &(0x7f0000002f00)=[{&(0x7f0000002a40)=""/161, 0xa1}, {&(0x7f0000002b00)=""/69, 0x45}, {&(0x7f0000002b80)=""/252, 0xfc}, {&(0x7f0000002c80)=""/180, 0xb4}, {&(0x7f0000002d40)=""/107, 0x6b}, {&(0x7f0000002dc0)=""/127, 0x7f}, {&(0x7f0000002e40)=""/152, 0x98}], 0x7, &(0x7f0000002f80)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}, 0x40000000) syz_mount_image$tmpfs(&(0x7f00000027c0), &(0x7f0000002800)='./file0\x00', 0x8, 0x2, &(0x7f0000002980)=[{&(0x7f0000002840)="a28627a5912b5a1bfc986d6505bbc96d", 0x10, 0x9}, {&(0x7f0000002880)="28db122a2cc1c1fb9f34b386658975d404dea684a9875e14fd4914f35281a9a78cbfbab8b364fd088ff58d80f7abb989096fdfc14185dfa2ebf19be7d95ec2b8aa86a9e00d45316d11b5d86be525ee17acbce35b06fa88198b9c40cac9f54b3d677bf358e6b66594189ebfb2e845905c84d144f73d622c0f1ad5e8b64d6ea1e4fa7d82ad5010271024f36cc7567094961880c5091b906c301c8cdf8c61b025977e0946093e96b5c925f75b773c037dd3dfee5613dbad6088cc7e2fa68876ce6fed1a6beb2c05772cf7064911b743f83090f803e30597dd2f8dee18192b0ca5f1f9ee2c451bcf7e2f", 0xe8, 0x101}], 0x2000000, &(0x7f0000003100)={[{@huge_always}, {@nr_inodes={'nr_inodes', 0x3d, [0x35, 0x35, 0x35, 0x30, 0x33]}}, {@gid={'gid', 0x3d, r5}}, {@huge_never}, {@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x67, 0x34, 0x6b, 0x30, 0x31, 0x37, 0x38, 0x39]}}], [{@fowner_gt}]}) getdents64(r2, &(0x7f0000000080)=""/47, 0x2f) 07:36:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf0000000f0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 787.935482][T15984] loop0: p1 p2 p3 p4 [ 787.944383][T15984] loop0: p1 start 10 is beyond EOD, truncated [ 787.950514][T15984] loop0: p2 start 16711679 is beyond EOD, truncated [ 787.957200][T15984] loop0: p3 start 225 is beyond EOD, truncated [ 787.963404][T15984] loop0: p4 start 2415919104 is beyond EOD, truncated [ 787.997248][T16034] loop4: detected capacity change from 0 to 224 07:36:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bffff7ffff0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:11 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000100000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 788.037526][T16042] loop5: detected capacity change from 0 to 224 [ 788.046543][T16043] loop0: detected capacity change from 0 to 1 [ 788.068011][T16041] loop1: detected capacity change from 0 to 1 07:36:11 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 788.089461][T16043] loop0: p1 p2 p3 p4 [ 788.093785][T16043] loop0: p1 start 10 is beyond EOD, truncated [ 788.099968][T16043] loop0: p2 start 16715520 is beyond EOD, truncated [ 788.106614][T16043] loop0: p3 start 225 is beyond EOD, truncated [ 788.112828][T16043] loop0: p4 start 2415919104 is beyond EOD, truncated 07:36:11 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201bfffffff0a000000ff45ac0000ffffffbf0008ffffefff000000024000ffffff82000000e10000008877007200300700a5ffffff00000090008000da55aa", 0x40, 0x1c0}]) 07:36:11 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x5, 0xf0c00) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) 07:36:11 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000110000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 788.156484][T16069] loop5: detected capacity change from 0 to 224 [ 788.179974][T16068] loop4: detected capacity change from 0 to 224 07:36:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bffffbffff0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:11 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000120000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}]}) [ 788.281650][T16087] loop5: detected capacity change from 0 to 224 [ 788.286476][T16089] loop0: detected capacity change from 0 to 1 07:36:11 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) 07:36:11 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x101400, 0x2) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r1, &(0x7f00000001c0)=""/267, 0x18) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000054440)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000056440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000057840)={0xff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}], 0x8, "a045bf8030ca57"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000300)={r4, 0x0, "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", "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"}) getdents64(r1, &(0x7f0000000080)=""/47, 0x2f) [ 788.325254][T16094] loop4: detected capacity change from 0 to 224 [ 788.362084][T16089] loop0: p1 p2 p3 p4 [ 788.368443][T16089] loop0: p1 start 10 is beyond EOD, truncated 07:36:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bff9fdffff0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) 07:36:11 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 07:36:11 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc15}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, 0x0, 0x13, &(0x7f0000000640)) ptrace(0x4206, r1) ptrace(0x4208, r1) [ 788.374566][T16089] loop0: p2 start 16773119 is beyond EOD, truncated [ 788.381214][T16089] loop0: p3 start 225 is beyond EOD, truncated [ 788.387357][T16089] loop0: p4 start 24