) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) 16:35:27 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:35:27 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000300)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:27 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:27 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f73668925430008012000040000", 0x13}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2294.190255] loop4: detected capacity change from 0 to 256 [ 2294.197519] FAT-fs (loop4): invalid media value (0x00) [ 2294.197936] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2294.221189] loop2: detected capacity change from 0 to 264192 [ 2294.233985] loop6: detected capacity change from 0 to 264192 [ 2294.244083] loop7: detected capacity change from 0 to 264192 16:35:27 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f73668925430008012000040000", 0x13}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2294.258200] loop5: detected capacity change from 0 to 264192 [ 2294.261618] loop2: detected capacity change from 0 to 264192 [ 2294.273266] loop4: detected capacity change from 0 to 256 [ 2294.274688] loop6: detected capacity change from 0 to 264192 [ 2294.282049] FAT-fs (loop4): invalid media value (0x00) [ 2294.283089] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2294.287878] loop7: detected capacity change from 0 to 264192 [ 2294.297500] loop5: detected capacity change from 0 to 264192 16:35:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2294.314651] loop7: detected capacity change from 0 to 256 [ 2294.318115] loop5: detected capacity change from 0 to 256 [ 2294.324804] loop6: detected capacity change from 0 to 256 16:35:27 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) [ 2294.339097] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2294.345552] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2294.357710] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2294.371424] loop2: detected capacity change from 0 to 264192 [ 2294.384246] loop2: detected capacity change from 0 to 264192 16:35:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:27 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f73668925430008012000040000", 0x13}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:27 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) [ 2294.459139] loop4: detected capacity change from 0 to 256 16:35:27 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2294.467861] FAT-fs (loop4): invalid media value (0x00) [ 2294.468286] FAT-fs (loop4): Can't find a valid FAT filesystem 16:35:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2294.511976] loop2: detected capacity change from 0 to 264192 [ 2294.512662] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2294.513567] Buffer I/O error on dev loop2, logical block 0, async page read [ 2294.521046] loop7: detected capacity change from 0 to 264192 [ 2294.534200] loop2: detected capacity change from 0 to 264192 [ 2294.534730] loop7: detected capacity change from 0 to 264192 [ 2294.542698] loop7: detected capacity change from 0 to 256 [ 2294.548823] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2294.556096] loop5: detected capacity change from 0 to 264192 [ 2294.573314] loop5: detected capacity change from 0 to 264192 [ 2294.587958] loop5: detected capacity change from 0 to 256 [ 2294.600121] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:35:41 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000", 0x1c}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:41 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:41 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:35:41 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) 16:35:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2308.038570] loop7: detected capacity change from 0 to 264192 [ 2308.041173] loop4: detected capacity change from 0 to 256 [ 2308.043759] loop5: detected capacity change from 0 to 264192 [ 2308.046110] loop2: detected capacity change from 0 to 264192 [ 2308.051715] loop6: detected capacity change from 0 to 264192 [ 2308.058099] loop2: detected capacity change from 0 to 264192 [ 2308.062624] FAT-fs (loop4): bogus number of FAT sectors [ 2308.063057] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2308.063902] loop7: detected capacity change from 0 to 264192 [ 2308.065760] loop5: detected capacity change from 0 to 264192 [ 2308.067891] loop6: detected capacity change from 0 to 264192 [ 2308.080282] loop5: detected capacity change from 0 to 256 [ 2308.085097] loop6: detected capacity change from 0 to 256 [ 2308.090786] loop7: detected capacity change from 0 to 256 [ 2308.099502] FAT-fs (loop2): bogus number of reserved sectors [ 2308.100854] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2308.102161] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:35:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2308.106731] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2308.112964] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:35:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000", 0x1c}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2308.194169] loop4: detected capacity change from 0 to 256 [ 2308.198005] FAT-fs (loop4): bogus number of FAT sectors [ 2308.198471] FAT-fs (loop4): Can't find a valid FAT filesystem 16:35:41 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2308.217010] loop5: detected capacity change from 0 to 264192 [ 2308.232058] loop5: detected capacity change from 0 to 264192 16:35:41 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2308.240803] loop5: detected capacity change from 0 to 256 16:35:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2308.255260] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:35:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000", 0x1c}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2308.295583] loop2: detected capacity change from 0 to 264192 [ 2308.305092] loop4: detected capacity change from 0 to 256 [ 2308.310401] FAT-fs (loop4): bogus number of FAT sectors [ 2308.310828] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2308.320007] loop6: detected capacity change from 0 to 264192 [ 2308.321610] loop2: detected capacity change from 0 to 264192 [ 2308.322851] loop7: detected capacity change from 0 to 264192 16:35:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2308.345946] loop7: detected capacity change from 0 to 264192 [ 2308.353107] loop6: detected capacity change from 0 to 264192 [ 2308.356075] FAT-fs (loop2): bogus number of reserved sectors [ 2308.357261] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2308.365297] loop7: detected capacity change from 0 to 256 [ 2308.369820] loop5: detected capacity change from 0 to 264192 [ 2308.382885] loop5: detected capacity change from 0 to 264192 16:35:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000", 0x21}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2308.390801] loop5: detected capacity change from 0 to 256 [ 2308.392750] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2308.396302] loop6: detected capacity change from 0 to 256 [ 2308.408956] loop4: detected capacity change from 0 to 256 [ 2308.415654] FAT-fs (loop4): bogus number of FAT sectors [ 2308.416099] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2308.417941] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:35:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:56 executing program 6: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:56 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000", 0x21}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:56 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:56 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:56 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) 16:35:56 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) [ 2323.287067] loop5: detected capacity change from 0 to 264192 [ 2323.295266] loop4: detected capacity change from 0 to 256 [ 2323.298465] loop7: detected capacity change from 0 to 264192 [ 2323.300505] FAT-fs (loop4): bogus number of FAT sectors [ 2323.300958] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2323.304120] loop5: detected capacity change from 0 to 264192 [ 2323.307984] loop6: detected capacity change from 0 to 264192 [ 2323.312733] loop2: detected capacity change from 0 to 264192 [ 2323.313127] loop5: detected capacity change from 0 to 256 [ 2323.327195] loop7: detected capacity change from 0 to 264192 [ 2323.337117] loop2: detected capacity change from 0 to 264192 [ 2323.344216] loop6: detected capacity change from 0 to 256 16:35:56 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:35:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000", 0x21}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2323.362141] loop7: detected capacity change from 0 to 256 [ 2323.370822] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2323.376896] FAT-fs (loop2): bogus number of reserved sectors [ 2323.377939] FAT-fs (loop2): Can't find a valid FAT filesystem 16:35:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2323.382313] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2323.416290] loop4: detected capacity change from 0 to 256 [ 2323.424641] FAT-fs (loop4): bogus number of FAT sectors [ 2323.425052] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2323.432001] loop5: detected capacity change from 0 to 264192 16:35:56 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2323.507909] loop5: detected capacity change from 0 to 256 16:36:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f800002000400003000000000000", 0x23}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:09 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) 16:36:09 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:36:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:09 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2336.634061] loop6: detected capacity change from 0 to 264192 [ 2336.634751] loop7: detected capacity change from 0 to 264192 [ 2336.637772] loop2: detected capacity change from 0 to 264192 [ 2336.640009] loop4: detected capacity change from 0 to 256 [ 2336.648290] FAT-fs (loop4): bogus number of FAT sectors [ 2336.648971] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2336.649018] loop5: detected capacity change from 0 to 264192 [ 2336.654021] loop7: detected capacity change from 0 to 264192 [ 2336.655749] loop2: detected capacity change from 0 to 264192 [ 2336.664819] loop6: detected capacity change from 0 to 264192 [ 2336.667113] loop7: detected capacity change from 0 to 256 [ 2336.670226] loop5: detected capacity change from 0 to 264192 [ 2336.672520] FAT-fs (loop2): bogus number of reserved sectors [ 2336.673104] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2336.676277] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2336.688668] loop6: detected capacity change from 0 to 256 [ 2336.690808] loop5: detected capacity change from 0 to 256 [ 2336.703573] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:36:10 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f800002000400003000000000000", 0x23}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:10 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:10 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:10 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2336.882469] loop4: detected capacity change from 0 to 256 [ 2336.894790] FAT-fs (loop4): bogus number of FAT sectors [ 2336.895656] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2336.899285] loop2: detected capacity change from 0 to 264192 [ 2336.911585] loop7: detected capacity change from 0 to 264192 16:36:10 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2336.926089] loop5: detected capacity change from 0 to 264192 [ 2336.937619] loop7: detected capacity change from 0 to 264192 [ 2336.941162] loop6: detected capacity change from 0 to 264192 [ 2336.958870] loop5: detected capacity change from 0 to 264192 [ 2336.962763] loop7: detected capacity change from 0 to 256 [ 2336.968198] loop6: detected capacity change from 0 to 264192 [ 2336.981152] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2336.986662] loop5: detected capacity change from 0 to 256 [ 2337.014736] FAT-fs (loop6): bogus number of reserved sectors [ 2337.015825] FAT-fs (loop6): Can't find a valid FAT filesystem 16:36:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f800002000400003000000000000", 0x23}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:10 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2337.116862] loop4: detected capacity change from 0 to 256 [ 2337.132780] FAT-fs (loop4): bogus number of FAT sectors [ 2337.133619] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2337.174179] loop2: detected capacity change from 0 to 264192 [ 2337.178798] loop7: detected capacity change from 0 to 264192 [ 2337.188121] loop2: detected capacity change from 0 to 264192 [ 2337.191223] loop7: detected capacity change from 0 to 264192 [ 2337.204181] loop7: detected capacity change from 0 to 256 [ 2337.206264] FAT-fs (loop2): bogus number of reserved sectors [ 2337.207307] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2337.218580] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:36:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:24 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:24 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:24 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) 16:36:24 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={0x0, 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:36:24 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000000000", 0x24}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2350.763310] loop7: detected capacity change from 0 to 264192 [ 2350.767757] loop5: detected capacity change from 0 to 264192 [ 2350.786032] loop5: detected capacity change from 0 to 264192 [ 2350.788420] loop7: detected capacity change from 0 to 264192 [ 2350.788990] loop6: detected capacity change from 0 to 264192 [ 2350.798570] loop7: detected capacity change from 0 to 256 [ 2350.799285] loop5: detected capacity change from 0 to 256 [ 2350.805118] loop6: detected capacity change from 0 to 264192 [ 2350.812000] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2350.817814] loop2: detected capacity change from 0 to 264192 [ 2350.824002] loop6: detected capacity change from 0 to 256 [ 2350.831158] loop4: detected capacity change from 0 to 256 [ 2350.836145] loop2: detected capacity change from 0 to 264192 [ 2350.838108] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2350.842146] FAT-fs (loop4): bogus number of FAT sectors [ 2350.843135] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2350.859114] loop2: detected capacity change from 0 to 256 16:36:24 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) [ 2350.875507] FAT-fs (loop2): bogus number of reserved sectors [ 2350.876610] FAT-fs (loop2): Can't find a valid FAT filesystem 16:36:24 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) 16:36:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000300)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:24 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2350.926680] loop5: detected capacity change from 0 to 264192 [ 2350.946282] loop7: detected capacity change from 0 to 264192 16:36:24 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000000000", 0x24}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2350.960639] loop7: detected capacity change from 0 to 264192 [ 2350.969708] loop7: detected capacity change from 0 to 256 [ 2350.974353] loop6: detected capacity change from 0 to 264192 [ 2350.983877] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2350.989738] loop6: detected capacity change from 0 to 264192 16:36:24 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) [ 2351.007013] loop6: detected capacity change from 0 to 256 [ 2351.018896] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:36:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000300)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2351.056671] loop4: detected capacity change from 0 to 256 [ 2351.069663] FAT-fs (loop4): bogus number of FAT sectors [ 2351.070493] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2351.088544] loop2: detected capacity change from 0 to 264192 [ 2351.104756] loop2: detected capacity change from 0 to 264192 [ 2351.107794] loop7: detected capacity change from 0 to 264192 [ 2351.120183] loop7: detected capacity change from 0 to 264192 [ 2351.124675] loop2: detected capacity change from 0 to 256 [ 2351.126747] loop7: detected capacity change from 0 to 256 [ 2351.131025] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2351.135142] FAT-fs (loop2): bogus number of reserved sectors [ 2351.136277] FAT-fs (loop2): Can't find a valid FAT filesystem 16:36:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:39 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={0x0, 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:36:39 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000300)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:39 executing program 6: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:39 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) 16:36:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000000000", 0x24}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:39 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) [ 2365.930571] loop5: detected capacity change from 0 to 264192 [ 2365.936875] loop6: detected capacity change from 0 to 264192 [ 2365.940295] loop7: detected capacity change from 0 to 264192 [ 2365.945804] loop6: detected capacity change from 0 to 256 [ 2365.951010] loop5: detected capacity change from 0 to 264192 [ 2365.953740] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2365.957116] loop2: detected capacity change from 0 to 264192 [ 2365.972922] loop7: detected capacity change from 0 to 264192 [ 2365.976530] loop4: detected capacity change from 0 to 256 [ 2365.983767] loop2: detected capacity change from 0 to 264192 [ 2365.991559] FAT-fs (loop4): bogus number of FAT sectors [ 2365.992456] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2365.998105] loop2: detected capacity change from 0 to 256 [ 2366.012862] FAT-fs (loop2): bogus number of reserved sectors [ 2366.013534] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2366.018649] loop7: detected capacity change from 0 to 256 16:36:39 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:39 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2366.042436] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2366.082072] loop5: detected capacity change from 0 to 264192 [ 2366.084496] loop6: detected capacity change from 0 to 264192 16:36:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2366.105291] loop6: detected capacity change from 0 to 264192 16:36:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, 0x0) 16:36:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{0x0}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2366.119821] loop6: detected capacity change from 0 to 256 [ 2366.131195] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:36:39 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2366.152047] loop2: detected capacity change from 0 to 264192 [ 2366.167693] loop2: detected capacity change from 0 to 264192 16:36:39 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2366.176866] loop2: detected capacity change from 0 to 256 [ 2366.183155] loop4: detected capacity change from 0 to 256 [ 2366.188834] FAT-fs (loop2): bogus number of reserved sectors [ 2366.189443] FAT-fs (loop2): Can't find a valid FAT filesystem 16:36:39 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2366.221188] loop5: detected capacity change from 0 to 264192 [ 2366.230082] loop7: detected capacity change from 0 to 264192 [ 2366.233889] loop5: detected capacity change from 0 to 264192 16:36:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2366.242648] loop7: detected capacity change from 0 to 264192 [ 2366.258861] FAT-fs (loop5): bogus number of reserved sectors [ 2366.259601] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2366.267719] loop7: detected capacity change from 0 to 256 [ 2366.283621] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2366.289305] loop6: detected capacity change from 0 to 264192 [ 2366.320067] loop6: detected capacity change from 0 to 256 [ 2366.334210] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:36:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, 0x0) 16:36:52 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) 16:36:52 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={0x0, 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:36:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:52 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{0x0}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2379.319048] loop7: detected capacity change from 0 to 264192 [ 2379.323178] loop5: detected capacity change from 0 to 264192 [ 2379.323203] loop2: detected capacity change from 0 to 264192 [ 2379.327238] loop4: detected capacity change from 0 to 256 [ 2379.338223] loop7: detected capacity change from 0 to 264192 [ 2379.339573] loop2: detected capacity change from 0 to 264192 [ 2379.343788] loop5: detected capacity change from 0 to 264192 [ 2379.345611] loop6: detected capacity change from 0 to 264192 [ 2379.346081] loop7: detected capacity change from 0 to 256 [ 2379.353178] loop2: detected capacity change from 0 to 256 [ 2379.361817] FAT-fs (loop2): bogus number of reserved sectors [ 2379.362560] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2379.363204] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2379.370252] loop6: detected capacity change from 0 to 264192 [ 2379.374488] FAT-fs (loop5): bogus number of reserved sectors [ 2379.375530] FAT-fs (loop5): Can't find a valid FAT filesystem 16:36:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2379.408262] loop6: detected capacity change from 0 to 256 16:36:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, 0x0) 16:36:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{0x0}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2379.436780] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2379.477784] loop2: detected capacity change from 0 to 264192 [ 2379.487307] loop7: detected capacity change from 0 to 264192 [ 2379.491738] loop2: detected capacity change from 0 to 264192 16:36:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2379.500266] loop7: detected capacity change from 0 to 264192 [ 2379.503864] loop2: detected capacity change from 0 to 256 [ 2379.511544] loop7: detected capacity change from 0 to 256 [ 2379.512290] FAT-fs (loop2): bogus number of reserved sectors [ 2379.513023] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2379.523739] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:36:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2379.543270] loop4: detected capacity change from 0 to 256 16:36:52 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:36:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2379.593712] loop5: detected capacity change from 0 to 264192 [ 2379.615081] loop5: detected capacity change from 0 to 264192 [ 2379.629010] loop6: detected capacity change from 0 to 264192 [ 2379.638820] loop6: detected capacity change from 0 to 264192 [ 2379.646829] loop6: detected capacity change from 0 to 256 [ 2379.649924] loop2: detected capacity change from 0 to 264192 [ 2379.651877] FAT-fs (loop5): bogus number of reserved sectors [ 2379.653137] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2379.654539] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:37:07 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:37:07 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) 16:37:07 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:07 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:07 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:07 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:07 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2394.195114] loop4: detected capacity change from 0 to 264192 [ 2394.214778] loop7: detected capacity change from 0 to 264192 [ 2394.224387] loop5: detected capacity change from 0 to 264192 [ 2394.229996] loop4: detected capacity change from 0 to 256 [ 2394.231008] loop2: detected capacity change from 0 to 264192 [ 2394.235255] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2394.259465] loop6: detected capacity change from 0 to 264192 [ 2394.267548] loop7: detected capacity change from 0 to 264192 [ 2394.272893] loop2: detected capacity change from 0 to 264192 [ 2394.275473] loop5: detected capacity change from 0 to 264192 [ 2394.282389] loop6: detected capacity change from 0 to 264192 16:37:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2394.312706] loop2: detected capacity change from 0 to 256 16:37:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2394.315577] loop6: detected capacity change from 0 to 256 [ 2394.315974] loop7: detected capacity change from 0 to 256 [ 2394.319263] FAT-fs (loop5): bogus number of reserved sectors [ 2394.320500] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2394.323111] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2394.336945] loop4: detected capacity change from 0 to 264192 [ 2394.340851] FAT-fs (loop2): bogus number of reserved sectors [ 2394.342100] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2394.347936] loop4: detected capacity change from 0 to 264192 [ 2394.361900] FAT-fs (loop4): bogus number of reserved sectors [ 2394.362578] FAT-fs (loop4): Can't find a valid FAT filesystem 16:37:07 executing program 6: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:07 executing program 4: syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:07 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:07 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:07 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2394.481706] loop6: detected capacity change from 0 to 264192 [ 2394.489542] loop7: detected capacity change from 0 to 264192 [ 2394.493721] loop6: detected capacity change from 0 to 264192 [ 2394.504213] loop7: detected capacity change from 0 to 264192 [ 2394.507246] loop6: detected capacity change from 0 to 256 [ 2394.512773] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2394.517160] loop7: detected capacity change from 0 to 256 [ 2394.532040] loop2: detected capacity change from 0 to 264192 [ 2394.532900] loop4: detected capacity change from 0 to 264192 [ 2394.546684] loop5: detected capacity change from 0 to 264192 [ 2394.547069] loop2: detected capacity change from 0 to 264192 [ 2394.556790] loop4: detected capacity change from 0 to 264192 [ 2394.565105] loop2: detected capacity change from 0 to 256 [ 2394.573507] loop5: detected capacity change from 0 to 264192 [ 2394.578960] FAT-fs (loop2): bogus number of reserved sectors [ 2394.579917] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2394.583725] loop4: detected capacity change from 0 to 256 [ 2394.603825] FAT-fs (loop5): bogus number of reserved sectors [ 2394.604960] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2394.607095] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:37:21 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={0x0, 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) 16:37:21 executing program 6: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:21 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:37:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f73668925430008012000040000", 0x13}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2407.686300] loop7: detected capacity change from 0 to 264192 [ 2407.693226] loop2: detected capacity change from 0 to 264192 [ 2407.698125] loop7: detected capacity change from 0 to 264192 [ 2407.700748] loop6: detected capacity change from 0 to 264192 [ 2407.704652] loop2: detected capacity change from 0 to 264192 [ 2407.709728] loop5: detected capacity change from 0 to 264192 [ 2407.710397] loop6: detected capacity change from 0 to 264192 [ 2407.713240] loop7: detected capacity change from 0 to 256 [ 2407.718954] loop6: detected capacity change from 0 to 256 [ 2407.721766] loop2: detected capacity change from 0 to 256 [ 2407.728918] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2407.731814] FAT-fs (loop2): invalid media value (0x00) [ 2407.732449] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2407.739031] loop4: detected capacity change from 0 to 264192 [ 2407.743826] loop5: detected capacity change from 0 to 264192 16:37:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:21 executing program 6: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:37:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f73668925430008012000040000", 0x13}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2407.790139] loop4: detected capacity change from 0 to 256 [ 2407.794538] loop5: detected capacity change from 0 to 256 [ 2407.797907] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2407.807920] loop7: detected capacity change from 0 to 264192 [ 2407.816066] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2407.816719] Buffer I/O error on dev loop7, logical block 0, async page read [ 2407.817251] loop7: unable to read partition table [ 2407.817814] loop7: partition table beyond EOD, truncated [ 2407.819188] FAT-fs (loop5): bogus number of reserved sectors [ 2407.820244] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2407.820299] loop7: detected capacity change from 0 to 264192 [ 2407.855268] loop2: detected capacity change from 0 to 264192 16:37:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2407.873237] loop2: detected capacity change from 0 to 264192 [ 2407.890011] loop2: detected capacity change from 0 to 256 [ 2407.901438] FAT-fs (loop2): invalid media value (0x00) [ 2407.901975] FAT-fs (loop2): Can't find a valid FAT filesystem 16:37:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2407.989774] loop4: detected capacity change from 0 to 264192 [ 2407.996015] loop5: detected capacity change from 0 to 264192 [ 2408.010680] loop4: detected capacity change from 0 to 264192 [ 2408.014123] loop5: detected capacity change from 0 to 264192 [ 2408.023607] loop4: detected capacity change from 0 to 256 [ 2408.033939] loop5: detected capacity change from 0 to 256 [ 2408.044514] FAT-fs (loop5): bogus number of reserved sectors [ 2408.045048] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2422.622710] loop6: detected capacity change from 0 to 264192 [ 2422.626911] loop2: detected capacity change from 0 to 264192 16:37:35 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f73668925430008012000040000", 0x13}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:35 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:35 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:37:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:35 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={0x0, 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) 16:37:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2422.631817] loop6: detected capacity change from 0 to 264192 [ 2422.634167] loop5: detected capacity change from 0 to 264192 [ 2422.643280] loop6: detected capacity change from 0 to 256 [ 2422.658151] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2422.658629] loop4: detected capacity change from 0 to 264192 [ 2422.664756] loop7: detected capacity change from 0 to 264192 [ 2422.666037] loop5: detected capacity change from 0 to 264192 [ 2422.667220] loop2: detected capacity change from 0 to 264192 16:37:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2422.687036] loop7: detected capacity change from 0 to 264192 [ 2422.696674] loop4: detected capacity change from 0 to 264192 [ 2422.699531] loop2: detected capacity change from 0 to 256 16:37:36 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f73668925430008012000040000", 0x13}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2422.706583] loop5: detected capacity change from 0 to 256 [ 2422.723204] loop7: detected capacity change from 0 to 256 [ 2422.729538] FAT-fs (loop5): bogus number of reserved sectors [ 2422.730759] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2422.738474] FAT-fs (loop2): invalid media value (0x00) [ 2422.739287] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2422.741153] loop4: detected capacity change from 0 to 256 16:37:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2422.764707] loop6: detected capacity change from 0 to 264192 [ 2422.765626] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2422.776062] I/O error, dev loop6, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2422.776737] Buffer I/O error on dev loop6, logical block 0, async page read [ 2422.777234] loop6: unable to read partition table [ 2422.781957] loop6: partition table beyond EOD, truncated [ 2422.787299] loop6: detected capacity change from 0 to 264192 16:37:36 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) 16:37:36 executing program 6: sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{0x0}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:36 executing program 4: syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000", 0x1c}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2422.890571] loop7: detected capacity change from 0 to 264192 [ 2422.921730] loop7: detected capacity change from 0 to 264192 [ 2422.933602] loop5: detected capacity change from 0 to 264192 [ 2422.938586] loop4: detected capacity change from 0 to 264192 [ 2422.942996] loop2: detected capacity change from 0 to 264192 [ 2422.952531] loop4: detected capacity change from 0 to 264192 [ 2422.954755] loop5: detected capacity change from 0 to 264192 [ 2422.954850] loop2: detected capacity change from 0 to 264192 [ 2422.967943] loop4: detected capacity change from 0 to 256 [ 2422.969120] loop2: detected capacity change from 0 to 256 [ 2422.971057] loop5: detected capacity change from 0 to 256 [ 2422.977493] FAT-fs (loop2): bogus number of FAT sectors [ 2422.978019] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2422.980904] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2422.988873] FAT-fs (loop5): bogus number of reserved sectors [ 2422.990001] FAT-fs (loop5): Can't find a valid FAT filesystem 16:37:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000", 0x1c}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) 16:37:50 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={0x0, 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) 16:37:50 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:37:50 executing program 6: sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{0x0}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:50 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2437.206541] loop7: detected capacity change from 0 to 264192 [ 2437.210234] loop6: detected capacity change from 0 to 264192 [ 2437.214266] loop2: detected capacity change from 0 to 264192 [ 2437.217992] loop7: detected capacity change from 0 to 264192 [ 2437.233307] loop4: detected capacity change from 0 to 264192 16:37:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) [ 2437.261624] loop7: detected capacity change from 0 to 264192 [ 2437.265847] loop2: detected capacity change from 0 to 264192 [ 2437.268895] loop6: detected capacity change from 0 to 256 [ 2437.273686] loop7: detected capacity change from 0 to 264192 [ 2437.276297] loop5: detected capacity change from 0 to 264192 16:37:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2437.280973] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2437.281781] Buffer I/O error on dev loop7, logical block 0, async page read [ 2437.282419] loop7: unable to read partition table [ 2437.284261] loop5: detected capacity change from 0 to 264192 [ 2437.286656] loop7: partition table beyond EOD, truncated [ 2437.292125] loop4: detected capacity change from 0 to 256 [ 2437.293823] loop5: detected capacity change from 0 to 256 [ 2437.298773] FAT-fs (loop5): bogus number of reserved sectors [ 2437.299309] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2437.305672] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2437.311764] loop2: detected capacity change from 0 to 256 16:37:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2437.333281] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2437.342553] FAT-fs (loop2): bogus number of FAT sectors [ 2437.343727] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2437.352763] loop7: detected capacity change from 0 to 264192 16:37:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{0x0}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2437.420934] loop5: detected capacity change from 0 to 264192 [ 2437.432854] loop5: detected capacity change from 0 to 264192 [ 2437.440041] loop5: detected capacity change from 0 to 256 16:37:50 executing program 6: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2437.448304] FAT-fs (loop5): bogus number of reserved sectors [ 2437.448867] FAT-fs (loop5): Can't find a valid FAT filesystem 16:37:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:37:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000", 0x1c}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2437.528787] loop5: detected capacity change from 0 to 264192 [ 2437.537731] loop5: detected capacity change from 0 to 264192 [ 2437.546248] loop5: detected capacity change from 0 to 256 [ 2437.548804] FAT-fs (loop5): bogus number of reserved sectors [ 2437.549281] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2437.583729] loop4: detected capacity change from 0 to 264192 [ 2437.591217] loop6: detected capacity change from 0 to 264192 [ 2437.595085] loop4: detected capacity change from 0 to 256 [ 2437.602148] loop2: detected capacity change from 0 to 264192 [ 2437.607723] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2437.616551] loop6: detected capacity change from 0 to 264192 [ 2437.631226] loop2: detected capacity change from 0 to 264192 [ 2437.631843] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2437.632873] Buffer I/O error on dev loop2, logical block 0, async page read [ 2437.640148] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2437.641097] Buffer I/O error on dev loop2, logical block 0, async page read [ 2437.641680] loop2: unable to read partition table [ 2437.644717] loop6: detected capacity change from 0 to 256 [ 2437.650096] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2437.662284] loop2: detected capacity change from 0 to 256 [ 2437.675623] FAT-fs (loop2): bogus number of FAT sectors [ 2437.676622] FAT-fs (loop2): Can't find a valid FAT filesystem 16:38:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:04 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:38:04 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) 16:38:04 executing program 4: syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:04 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:04 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:04 executing program 6: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:04 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000", 0x21}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2451.091896] loop5: detected capacity change from 0 to 264192 [ 2451.096204] loop6: detected capacity change from 0 to 264192 [ 2451.105480] loop5: detected capacity change from 0 to 264192 16:38:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2451.111267] loop2: detected capacity change from 0 to 264192 [ 2451.114039] loop5: detected capacity change from 0 to 256 [ 2451.123830] FAT-fs (loop5): bogus number of reserved sectors [ 2451.124771] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2451.126088] loop6: detected capacity change from 0 to 264192 [ 2451.128019] loop2: detected capacity change from 0 to 264192 [ 2451.132985] loop4: detected capacity change from 0 to 264192 [ 2451.134374] loop7: detected capacity change from 0 to 264192 [ 2451.136987] loop2: detected capacity change from 0 to 256 [ 2451.147064] FAT-fs (loop2): bogus number of FAT sectors [ 2451.147633] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2451.154993] loop4: detected capacity change from 0 to 264192 [ 2451.162081] loop7: detected capacity change from 0 to 264192 [ 2451.164861] loop6: detected capacity change from 0 to 256 16:38:04 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2451.186980] loop4: detected capacity change from 0 to 256 [ 2451.188241] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2451.203807] FAT-fs (loop7): bogus number of reserved sectors [ 2451.204892] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2451.209033] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2451.232540] loop5: detected capacity change from 0 to 264192 16:38:20 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) 16:38:20 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r0, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:38:20 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:38:20 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:20 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000", 0x21}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:20 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f73668925430008012000040000", 0x13}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:20 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:20 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) [ 2467.603175] loop2: detected capacity change from 0 to 264192 [ 2467.612028] loop6: detected capacity change from 0 to 264192 [ 2467.617292] loop7: detected capacity change from 0 to 264192 [ 2467.620127] loop5: detected capacity change from 0 to 264192 [ 2467.629526] loop2: detected capacity change from 0 to 264192 [ 2467.639712] loop7: detected capacity change from 0 to 264192 [ 2467.639780] loop5: detected capacity change from 0 to 264192 [ 2467.648090] loop2: detected capacity change from 0 to 256 [ 2467.651922] loop6: detected capacity change from 0 to 256 [ 2467.657996] loop5: detected capacity change from 0 to 256 [ 2467.664617] FAT-fs (loop7): bogus number of reserved sectors [ 2467.665711] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2467.667421] FAT-fs (loop2): bogus number of FAT sectors [ 2467.668237] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2467.672019] FAT-fs (loop5): invalid media value (0x00) [ 2467.672877] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2467.673886] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:38:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000", 0x21}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f73668925430008012000040000", 0x13}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:21 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2467.802586] loop2: detected capacity change from 0 to 264192 [ 2467.860116] loop5: detected capacity change from 0 to 264192 [ 2467.868980] loop7: detected capacity change from 0 to 264192 [ 2467.876142] loop5: detected capacity change from 0 to 264192 [ 2467.881265] loop6: detected capacity change from 0 to 264192 [ 2467.896764] loop7: detected capacity change from 0 to 264192 [ 2467.898180] loop5: detected capacity change from 0 to 256 16:38:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f800002000400003000000000000", 0x23}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2467.910865] loop6: detected capacity change from 0 to 256 [ 2467.918270] FAT-fs (loop5): invalid media value (0x00) [ 2467.919281] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2467.924555] FAT-fs (loop7): bogus number of reserved sectors [ 2467.926034] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2467.930026] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2467.991047] loop2: detected capacity change from 0 to 264192 16:38:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2468.011013] loop2: detected capacity change from 0 to 264192 16:38:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f73668925430008012000040000", 0x13}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:21 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2468.038801] loop2: detected capacity change from 0 to 256 [ 2468.047881] FAT-fs (loop2): bogus number of FAT sectors [ 2468.048776] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2468.089312] loop7: detected capacity change from 0 to 264192 [ 2468.101183] loop5: detected capacity change from 0 to 264192 [ 2468.106893] loop7: detected capacity change from 0 to 264192 [ 2468.118187] loop5: detected capacity change from 0 to 264192 [ 2468.123012] loop6: detected capacity change from 0 to 264192 [ 2468.131711] loop5: detected capacity change from 0 to 256 [ 2468.138906] FAT-fs (loop7): bogus number of reserved sectors [ 2468.140102] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2468.149989] FAT-fs (loop5): invalid media value (0x00) [ 2468.150953] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2468.154421] loop6: detected capacity change from 0 to 264192 [ 2468.174273] loop6: detected capacity change from 0 to 256 [ 2468.192077] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2481.988130] loop2: detected capacity change from 0 to 264192 16:38:35 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) 16:38:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:35 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r3 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, 0x0, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r3, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r4, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:38:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r0, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:38:35 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:38:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) [ 2481.998679] loop7: detected capacity change from 0 to 264192 [ 2482.002284] loop5: detected capacity change from 0 to 264192 syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f800002000400003000000000000", 0x23}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:35 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000", 0x1c}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2482.014955] loop5: detected capacity change from 0 to 264192 [ 2482.016513] loop7: detected capacity change from 0 to 264192 [ 2482.016626] loop4: detected capacity change from 0 to 264192 [ 2482.017916] loop2: detected capacity change from 0 to 264192 [ 2482.027755] loop7: detected capacity change from 0 to 256 [ 2482.029038] loop2: detected capacity change from 0 to 256 [ 2482.033833] loop5: detected capacity change from 0 to 256 [ 2482.039077] FAT-fs (loop7): bogus number of reserved sectors [ 2482.039835] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2482.041187] FAT-fs (loop5): bogus number of FAT sectors [ 2482.042309] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2482.043753] FAT-fs (loop2): bogus number of FAT sectors [ 2482.043868] loop4: detected capacity change from 0 to 264192 [ 2482.044451] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2482.061736] loop4: detected capacity change from 0 to 256 [ 2482.076186] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:38:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f800002000400003000000000000", 0x23}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:35 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000", 0x1c}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2482.143841] loop2: detected capacity change from 0 to 264192 16:38:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2482.150002] loop7: detected capacity change from 0 to 264192 [ 2482.159971] loop2: detected capacity change from 0 to 264192 [ 2482.163267] loop7: detected capacity change from 0 to 264192 [ 2482.174590] loop2: detected capacity change from 0 to 256 [ 2482.179462] loop5: detected capacity change from 0 to 264192 [ 2482.181022] loop7: detected capacity change from 0 to 256 [ 2482.182934] FAT-fs (loop2): bogus number of FAT sectors [ 2482.183704] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2482.188588] FAT-fs (loop7): bogus number of reserved sectors [ 2482.189258] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2482.194109] loop5: detected capacity change from 0 to 264192 [ 2482.197931] loop4: detected capacity change from 0 to 256 [ 2482.219992] loop5: detected capacity change from 0 to 256 [ 2482.225554] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2482.234640] FAT-fs (loop5): bogus number of FAT sectors [ 2482.235469] FAT-fs (loop5): Can't find a valid FAT filesystem 16:38:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000000000", 0x24}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:35 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2482.271712] loop2: detected capacity change from 0 to 264192 [ 2482.280691] loop2: detected capacity change from 0 to 264192 [ 2482.288918] loop2: detected capacity change from 0 to 256 [ 2482.295202] FAT-fs (loop2): bogus number of FAT sectors [ 2482.295810] FAT-fs (loop2): Can't find a valid FAT filesystem 16:38:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2482.313137] loop7: detected capacity change from 0 to 264192 16:38:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000", 0x1c}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2482.331841] loop7: detected capacity change from 0 to 264192 [ 2482.346705] loop7: detected capacity change from 0 to 256 [ 2482.355884] FAT-fs (loop7): bogus number of reserved sectors [ 2482.356757] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2482.363062] loop4: detected capacity change from 0 to 264192 [ 2482.372297] loop5: detected capacity change from 0 to 264192 [ 2482.382030] loop5: detected capacity change from 0 to 264192 [ 2482.388589] loop4: detected capacity change from 0 to 264192 [ 2482.389426] loop5: detected capacity change from 0 to 256 [ 2482.394233] FAT-fs (loop5): bogus number of FAT sectors [ 2482.394875] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2482.405139] loop4: detected capacity change from 0 to 256 [ 2482.416985] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:38:52 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) 16:38:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000000000", 0x24}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{0x0}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000", 0x21}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:52 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r3 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, 0x0, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r3, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r4, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:38:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000000000", 0x24}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:52 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) [ 2498.754935] loop7: detected capacity change from 0 to 264192 [ 2498.776218] loop7: detected capacity change from 0 to 264192 [ 2498.786088] loop7: detected capacity change from 0 to 256 [ 2498.795933] FAT-fs (loop7): bogus number of reserved sectors [ 2498.796600] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2498.821399] loop5: detected capacity change from 0 to 264192 [ 2498.823786] loop4: detected capacity change from 0 to 264192 [ 2498.824171] loop2: detected capacity change from 0 to 264192 [ 2498.839132] loop5: detected capacity change from 0 to 264192 [ 2498.847493] loop4: detected capacity change from 0 to 264192 [ 2498.848993] loop2: detected capacity change from 0 to 264192 16:38:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{0x0}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2498.863090] loop5: detected capacity change from 0 to 256 [ 2498.867236] loop2: detected capacity change from 0 to 256 [ 2498.879822] FAT-fs (loop5): bogus number of FAT sectors [ 2498.880263] FAT-fs (loop2): bogus number of FAT sectors [ 2498.880932] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2498.881060] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2498.886194] loop4: detected capacity change from 0 to 256 [ 2498.895431] loop7: detected capacity change from 0 to 264192 [ 2498.911655] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:38:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000000000", 0x24}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{0x0}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:38:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000", 0x21}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2499.015489] loop7: detected capacity change from 0 to 264192 [ 2499.027270] loop7: detected capacity change from 0 to 264192 16:38:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2499.042248] loop7: detected capacity change from 0 to 256 [ 2499.043917] loop2: detected capacity change from 0 to 264192 [ 2499.050151] FAT-fs (loop7): bogus number of reserved sectors [ 2499.050822] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2499.054128] loop2: detected capacity change from 0 to 264192 [ 2499.062291] loop5: detected capacity change from 0 to 264192 [ 2499.068119] loop2: detected capacity change from 0 to 256 [ 2499.078615] FAT-fs (loop2): bogus number of FAT sectors [ 2499.079099] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2499.082488] loop5: detected capacity change from 0 to 264192 16:38:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2499.105956] loop5: detected capacity change from 0 to 256 16:38:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2499.114184] FAT-fs (loop5): bogus number of FAT sectors [ 2499.115233] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2499.119395] loop4: detected capacity change from 0 to 264192 [ 2499.156763] loop4: detected capacity change from 0 to 256 [ 2499.157512] loop7: detected capacity change from 0 to 264192 [ 2499.167212] loop7: detected capacity change from 0 to 264192 [ 2499.175183] loop7: detected capacity change from 0 to 256 [ 2499.178154] FAT-fs (loop7): bogus number of reserved sectors [ 2499.179200] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2499.182274] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:39:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, 0x0) 16:39:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000", 0x21}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:09 executing program 4: syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:09 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:39:09 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r3 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, 0x0, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r3, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r4, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:39:09 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) [ 2516.162261] loop5: detected capacity change from 0 to 264192 [ 2516.180839] loop5: detected capacity change from 0 to 264192 [ 2516.188104] loop5: detected capacity change from 0 to 256 [ 2516.191430] FAT-fs (loop5): bogus number of FAT sectors [ 2516.191918] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2516.216255] loop7: detected capacity change from 0 to 264192 [ 2516.223676] loop7: detected capacity change from 0 to 264192 [ 2516.231711] loop4: detected capacity change from 0 to 264192 [ 2516.233264] loop2: detected capacity change from 0 to 264192 [ 2516.234783] loop7: detected capacity change from 0 to 256 [ 2516.250446] FAT-fs (loop7): bogus number of reserved sectors [ 2516.250983] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2516.251917] loop2: detected capacity change from 0 to 264192 [ 2516.255292] loop4: detected capacity change from 0 to 264192 16:39:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f800002000400003000000000000", 0x23}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2516.275689] loop2: detected capacity change from 0 to 256 [ 2516.286746] loop4: detected capacity change from 0 to 256 [ 2516.293644] loop5: detected capacity change from 0 to 264192 [ 2516.302927] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:39:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f800002000400003000000000000", 0x23}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, 0x0) [ 2516.364160] loop7: detected capacity change from 0 to 264192 [ 2516.374887] loop7: detected capacity change from 0 to 264192 [ 2516.382746] loop7: detected capacity change from 0 to 256 [ 2516.388424] FAT-fs (loop7): bogus number of reserved sectors [ 2516.388954] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2516.401843] loop5: detected capacity change from 0 to 264192 16:39:09 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) [ 2516.411969] loop5: detected capacity change from 0 to 264192 [ 2516.419696] loop5: detected capacity change from 0 to 256 [ 2516.427085] FAT-fs (loop5): bogus number of FAT sectors [ 2516.427648] FAT-fs (loop5): Can't find a valid FAT filesystem 16:39:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f73668925430008012000040000", 0x13}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2516.458818] loop2: detected capacity change from 0 to 264192 [ 2516.476225] loop2: detected capacity change from 0 to 264192 16:39:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f800002000400003000000000000", 0x23}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2516.489695] loop7: detected capacity change from 0 to 264192 16:39:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2516.499064] loop2: detected capacity change from 0 to 256 [ 2516.500170] loop7: detected capacity change from 0 to 264192 [ 2516.507773] loop7: detected capacity change from 0 to 256 [ 2516.516105] FAT-fs (loop7): invalid media value (0x00) [ 2516.516774] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2516.522016] loop5: detected capacity change from 0 to 264192 [ 2516.534891] loop5: detected capacity change from 0 to 264192 [ 2516.541936] loop5: detected capacity change from 0 to 256 [ 2516.548123] FAT-fs (loop5): bogus number of FAT sectors [ 2516.548681] FAT-fs (loop5): Can't find a valid FAT filesystem 16:39:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, 0x0) [ 2516.631019] loop2: detected capacity change from 0 to 264192 [ 2516.638043] loop2: detected capacity change from 0 to 264192 [ 2516.644524] loop2: detected capacity change from 0 to 256 16:39:23 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 16:39:23 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, 0x0) 16:39:23 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, 0x0) 16:39:23 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000000000", 0x24}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:23 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:39:23 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) 16:39:23 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f73668925430008012000040000", 0x13}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2529.732297] loop6: detected capacity change from 0 to 264192 [ 2529.741150] loop7: detected capacity change from 0 to 264192 [ 2529.744372] loop6: detected capacity change from 0 to 264192 [ 2529.747251] loop5: detected capacity change from 0 to 264192 [ 2529.764062] loop5: detected capacity change from 0 to 264192 [ 2529.766589] loop6: detected capacity change from 0 to 256 [ 2529.767103] loop7: detected capacity change from 0 to 264192 [ 2529.770844] loop5: detected capacity change from 0 to 256 [ 2529.778490] FAT-fs (loop5): bogus number of FAT sectors [ 2529.778990] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2529.787429] loop2: detected capacity change from 0 to 264192 [ 2529.797237] loop7: detected capacity change from 0 to 256 [ 2529.814534] loop2: detected capacity change from 0 to 264192 16:39:23 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2529.815608] FAT-fs (loop7): invalid media value (0x00) [ 2529.816872] FAT-fs (loop7): Can't find a valid FAT filesystem 16:39:23 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000000000", 0x24}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2529.849981] loop2: detected capacity change from 0 to 256 [ 2529.894669] loop5: detected capacity change from 0 to 264192 16:39:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000000000", 0x24}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:23 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f73668925430008012000040000", 0x13}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2529.916810] loop5: detected capacity change from 0 to 264192 [ 2529.927516] loop5: detected capacity change from 0 to 256 16:39:23 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r3 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r3, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r4, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) [ 2529.933595] FAT-fs (loop5): bogus number of FAT sectors [ 2529.934083] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2529.968277] loop7: detected capacity change from 0 to 264192 16:39:23 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000000000", 0x24}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2529.981137] loop7: detected capacity change from 0 to 264192 [ 2529.993147] loop7: detected capacity change from 0 to 256 16:39:23 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2530.000629] FAT-fs (loop7): invalid media value (0x00) [ 2530.001106] FAT-fs (loop7): Can't find a valid FAT filesystem 16:39:23 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000", 0x1c}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2530.042502] loop5: detected capacity change from 0 to 264192 [ 2530.050479] loop6: detected capacity change from 0 to 264192 [ 2530.059812] loop5: detected capacity change from 0 to 264192 [ 2530.066403] loop6: detected capacity change from 0 to 264192 [ 2530.069993] loop5: detected capacity change from 0 to 256 [ 2530.076610] FAT-fs (loop5): bogus number of FAT sectors [ 2530.077079] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2530.081876] loop7: detected capacity change from 0 to 264192 [ 2530.086679] loop6: detected capacity change from 0 to 256 [ 2530.089057] loop7: detected capacity change from 0 to 264192 [ 2530.096967] loop7: detected capacity change from 0 to 256 [ 2530.099864] FAT-fs (loop7): bogus number of FAT sectors [ 2530.100436] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2530.102567] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2530.645213] loop7: detected capacity change from 0 to 264192 16:39:23 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 16:39:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:23 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, 0x0) 16:39:23 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000", 0x1c}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:23 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:23 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:39:23 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) [ 2530.668085] loop7: detected capacity change from 0 to 264192 [ 2530.669201] loop5: detected capacity change from 0 to 264192 [ 2530.673038] loop7: detected capacity change from 0 to 256 [ 2530.677297] FAT-fs (loop7): bogus number of FAT sectors [ 2530.677816] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2530.687303] loop6: detected capacity change from 0 to 264192 [ 2530.693006] loop5: detected capacity change from 0 to 264192 16:39:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000", 0x1c}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2530.720627] loop5: detected capacity change from 0 to 256 [ 2530.731191] loop6: detected capacity change from 0 to 256 [ 2530.741051] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2530.758836] loop7: detected capacity change from 0 to 264192 16:39:24 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, 0x0) 16:39:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:24 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2530.859808] loop5: detected capacity change from 0 to 264192 [ 2530.891595] loop6: detected capacity change from 0 to 264192 16:39:40 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) fcntl$notify(r0, 0x402, 0x33) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:39:40 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r3 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r3, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r4, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r2, 0x407, 0x0) 16:39:40 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000", 0x1c}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:40 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, 0x0) 16:39:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000", 0x21}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:40 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:40 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') fcntl$notify(r0, 0x402, 0x33) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') r4 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x1f, 0xe1, 0x0, 0x9, 0x0, 0x8000, 0x9000, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f7, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x4, 0x0, 0x2}, r1, 0x2, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) writev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="fa21e150e307ff3a1ac5ec1768c57d5ef105740cf84fe5ead3d9195ce19674c393f27e2d01e75abebf421d02d6491cc2f9cddae46b01afc8ee3850cc83a1651d016e5e65310e4cf6d3093250672fa1a4a8ad975fa599b248", 0x58}, {&(0x7f0000000340)="d52fae0c3eeb7d7906a662a7992bc25b84e73e90cfe002f08e007f7d8a72da036b18520e2e115c8b653e3b37fba7f9e948e2d5b957bc82179ba445742c5a4fdc8f1b823457729b17a8a4e8f90bc30be0d1427cb358a75e0e6ef1a1273e2959c5e78fbb3a18fd294bac264995fc0dac8d81e81e64874b08b124828e124b71cc99fe36bd6fea345ebf0325b1dd8196f0a321", 0x91}, {&(0x7f0000000400)="dea3d27c3b8a0b13b1a7c4a461f73ec873dbd940213ee1f6484e622576ece46442212bb8489d544bc2d85c4e3e021e39c3d5597c80be798b9d1ed91e012b0c8dc0ceca5deeb2a6fb56b67fd078ef3bd7f8d0c85da1a1d74e6e5f15db5b6d2adf06fbec35ed86e1d7f0b8bfe65689d0b283df00b7b34a9219d0e34b3f4eb3974acf94b262b58c6f911368f1c0a111c3429aeabb181309dcf3357ce1b1ad306a5c318239a1e3c94aa588257831fb9d8b99c926f0da19627dab3ca206ec759027f0f912449a7be95b1c7bd7", 0xca}, {&(0x7f0000000500)="e74299c1625add622a11a822eb208ff1d36d595d846fb147444877209c053bddfc0200e74bc8b9bed6262361a2038cb51d260ac6bfb8ca78cb424f68f7b2c16fdeb7e6760825035c4f150e63161c0aae72bc12520ad2711e", 0x58}, {&(0x7f0000000580)="840df436742289a5df6530a80f2be167a2367f080403bf83bb7869f00ed0b2d2e103657a19cd1e6fe1448d4cf19471a592c57410879a446e017afbbd8b93f895f851e2b70858a383da28dd3d19f5861bf2b6a5d74f1b072fa389530caf02307deca9fca720e4275bddc212df639c", 0x6e}, {&(0x7f0000000600)="5585f496eb2d863c68c4a08315b9a5e26ecdad354e96885d9fe19ed2f11540799258c8992b3e304177be4f80b214c5bd5733db1c249c65dc778b4b41de91f4483d3258fa97771179c352e9dee2a79b1bfd", 0x51}, {&(0x7f0000000680)="43e29b6bba10d5f0827c431e1a854d1db3b55abc6963645d044b537eb07e93a838517e7d61d6606f60c54e1374d88303eb910f8ed51693f5fd765437bddc039969add50f7c557e97676c567c319b751e928611f0e816552a9d3d2cd96ed07e3fc173a9b719376c15c0ae3468d1a78697f298fc13b4c1c9d6fca8224d566ad607c562b74adabb1cfc6d8941e35a7659a4edbce5a506e026db6e4148f34e04e4da6e55ca05fd06d4", 0xa7}, {&(0x7f0000000740)="cd9bc5c7fed22d71e729a71f01920a983ee4d125fee3d2c2265705c565415b632704f749281b5f2e9c834ad5ce25b4c806f93878af526addc20f422f719a12cbe5a90897828fb36e6cfa8fd940d8b16fa45c39fed46abed912fc35dc65f2bad6dc18fcaf9cbc129f131da45cf49e3a270569964b81eaa94c7f81ad447cc6daaf87f5849cf423cf284b90c1fc524a", 0x8e}], 0x8) write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14}, 0x14) fcntl$setpipe(r3, 0x407, 0x0) [ 2546.945864] loop7: detected capacity change from 0 to 264192 [ 2546.960284] loop5: detected capacity change from 0 to 264192 [ 2546.964786] loop4: detected capacity change from 0 to 264192 [ 2546.980395] loop5: detected capacity change from 0 to 264192 [ 2546.984831] loop6: detected capacity change from 0 to 264192 [ 2546.988940] loop7: detected capacity change from 0 to 264192 [ 2547.001055] loop6: detected capacity change from 0 to 264192 [ 2547.003137] loop4: detected capacity change from 0 to 264192 [ 2547.003600] loop5: detected capacity change from 0 to 256 [ 2547.016794] loop7: detected capacity change from 0 to 256 [ 2547.019129] loop6: detected capacity change from 0 to 256 [ 2547.031888] loop4: detected capacity change from 0 to 256 [ 2547.036772] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2547.037799] FAT-fs (loop7): bogus number of FAT sectors [ 2547.037844] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2547.063309] FAT-fs (loop4): bogus number of FAT sectors [ 2547.064184] FAT-fs (loop4): Can't find a valid FAT filesystem 16:39:40 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='fdinfo/3\x00') read$hiddev(r1, &(0x7f0000000200)=""/114, 0x72) readv(r1, &(0x7f0000000540)=[{&(0x7f0000000640)=""/185, 0xb9}, {&(0x7f0000000300)=""/123, 0x7b}], 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r3 = eventfd2(0x397e, 0x80002) fstatfs(r3, &(0x7f0000001240)=""/202) r4 = getpgrp(0x0) setpriority(0x1, r4, 0x0) perf_event_open(&(0x7f00000011c0)={0x0, 0x80, 0x1, 0x80, 0x0, 0x2, 0x0, 0x80, 0x21100, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x1ff, 0xd3}, 0x10000, 0x9, 0x1ff, 0x5, 0x5d36b58d, 0x20, 0x5, 0x0, 0x2, 0x0, 0x2}, r4, 0x10, r2, 0x2) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000140)=0xffffffffffffffd2, 0x12) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0x9, 0x5, 0x6e5, 0x9, 0x16, "d4dce27a4d1a6557"}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000700)=ANY=[@ANYBLOB="0100000077858d81d44714cf37ee6dc2fe0100000018000000", @ANYRES32, @ANYBLOB="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"]) 16:39:40 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='fdinfo/3\x00') read$hiddev(r1, &(0x7f0000000200)=""/114, 0x72) readv(r1, &(0x7f0000000540)=[{&(0x7f0000000640)=""/185, 0xb9}, {&(0x7f0000000300)=""/123, 0x7b}], 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r3 = eventfd2(0x397e, 0x80002) fstatfs(r3, &(0x7f0000001240)=""/202) r4 = getpgrp(0x0) setpriority(0x1, r4, 0x0) perf_event_open(&(0x7f00000011c0)={0x0, 0x80, 0x1, 0x80, 0x0, 0x2, 0x0, 0x80, 0x21100, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x1ff, 0xd3}, 0x10000, 0x9, 0x1ff, 0x5, 0x5d36b58d, 0x20, 0x5, 0x0, 0x2, 0x0, 0x2}, r4, 0x10, r2, 0x2) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000140)=0xffffffffffffffd2, 0x12) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0x9, 0x5, 0x6e5, 0x9, 0x16, "d4dce27a4d1a6557"}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000700)=ANY=[@ANYBLOB="0100000077858d81d44714cf37ee6dc2fe0100000018000000", @ANYRES32, @ANYBLOB="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"]) 16:39:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000", 0x21}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2547.198091] loop7: detected capacity change from 0 to 264192 [ 2547.209888] loop7: detected capacity change from 0 to 264192 [ 2547.220884] loop7: detected capacity change from 0 to 256 [ 2547.225682] FAT-fs (loop7): bogus number of FAT sectors [ 2547.226548] FAT-fs (loop7): Can't find a valid FAT filesystem 16:39:40 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='fdinfo/3\x00') read$hiddev(r1, &(0x7f0000000200)=""/114, 0x72) readv(r1, &(0x7f0000000540)=[{&(0x7f0000000640)=""/185, 0xb9}, {&(0x7f0000000300)=""/123, 0x7b}], 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r3 = eventfd2(0x397e, 0x80002) fstatfs(r3, &(0x7f0000001240)=""/202) r4 = getpgrp(0x0) setpriority(0x1, r4, 0x0) perf_event_open(&(0x7f00000011c0)={0x0, 0x80, 0x1, 0x80, 0x0, 0x2, 0x0, 0x80, 0x21100, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x1ff, 0xd3}, 0x10000, 0x9, 0x1ff, 0x5, 0x5d36b58d, 0x20, 0x5, 0x0, 0x2, 0x0, 0x2}, r4, 0x10, r2, 0x2) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000140)=0xffffffffffffffd2, 0x12) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0x9, 0x5, 0x6e5, 0x9, 0x16, "d4dce27a4d1a6557"}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000700)=ANY=[@ANYBLOB="0100000077858d81d44714cf37ee6dc2fe0100000018000000", @ANYRES32, @ANYBLOB="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"]) 16:39:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f80000200040000300000000", 0x21}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2547.308808] loop7: detected capacity change from 0 to 264192 [ 2547.318756] loop7: detected capacity change from 0 to 264192 [ 2547.328112] loop7: detected capacity change from 0 to 256 [ 2547.333602] FAT-fs (loop7): bogus number of FAT sectors [ 2547.334169] FAT-fs (loop7): Can't find a valid FAT filesystem 16:39:40 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) (fail_nth: 1) getpeername(r0, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 16:39:40 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='fdinfo/3\x00') read$hiddev(r1, &(0x7f0000000200)=""/114, 0x72) readv(r1, &(0x7f0000000540)=[{&(0x7f0000000640)=""/185, 0xb9}, {&(0x7f0000000300)=""/123, 0x7b}], 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r3 = eventfd2(0x397e, 0x80002) fstatfs(r3, &(0x7f0000001240)=""/202) r4 = getpgrp(0x0) setpriority(0x1, r4, 0x0) perf_event_open(&(0x7f00000011c0)={0x0, 0x80, 0x1, 0x80, 0x0, 0x2, 0x0, 0x80, 0x21100, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x1ff, 0xd3}, 0x10000, 0x9, 0x1ff, 0x5, 0x5d36b58d, 0x20, 0x5, 0x0, 0x2, 0x0, 0x2}, r4, 0x10, r2, 0x2) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000140)=0xffffffffffffffd2, 0x12) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0x9, 0x5, 0x6e5, 0x9, 0x16, "d4dce27a4d1a6557"}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000700)=ANY=[@ANYBLOB="0100000077858d81d44714cf37ee6dc2fe0100000018000000", @ANYRES32, @ANYBLOB="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"]) 16:39:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f800002000400003000000000000", 0x23}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2547.402021] loop6: detected capacity change from 0 to 264192 [ 2547.429086] loop7: detected capacity change from 0 to 264192 [ 2547.435923] loop6: detected capacity change from 0 to 264192 [ 2547.439736] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2547.440703] Buffer I/O error on dev loop7, logical block 0, async page read [ 2547.441458] loop7: unable to read partition table [ 2547.460856] loop7: partition table beyond EOD, truncated [ 2547.463140] loop7: detected capacity change from 0 to 264192 [ 2547.463928] FAULT_INJECTION: forcing a failure. [ 2547.463928] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 2547.465951] CPU: 0 PID: 11124 Comm: syz-executor.6 Not tainted 6.0.0-rc1-next-20220819 #1 [ 2547.467103] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1521 [ 2547.468265] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 11124, name: syz-executor.6 [ 2547.469419] preempt_count: 0, expected: 0 [ 2547.469981] RCU nest depth: 0, expected: 0 [ 2547.470584] 2 locks held by syz-executor.6/11124: [ 2547.471233] #0: ffffffff85949c28 (rtnl_mutex){+.+.}-{3:3}, at: ip_setsockopt+0x327/0x35b0 [ 2547.472412] #1: ffff88800e8ca6b0 (sk_lock-AF_INET){+.+.}-{0:0}, at: ip_setsockopt+0x331/0x35b0 [ 2547.473596] irq event stamp: 3708 [ 2547.474049] hardirqs last enabled at (3707): [] __up_console_sem+0x78/0x80 [ 2547.475207] hardirqs last disabled at (3708): [] dump_stack_lvl+0x2e/0xb3 [ 2547.476349] softirqs last enabled at (3702): [] __irq_exit_rcu+0x11b/0x180 [ 2547.477517] softirqs last disabled at (3687): [] __irq_exit_rcu+0x11b/0x180 [ 2547.478675] CPU: 0 PID: 11124 Comm: syz-executor.6 Not tainted 6.0.0-rc1-next-20220819 #1 [ 2547.483250] syz-executor.6[11124] cmdline: /syz-executor.6 exec [ 2547.484293] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2547.486103] Call Trace: [ 2547.486655] [ 2547.486990] dump_stack_lvl+0x8b/0xb3 [ 2547.487714] __might_resched.cold+0x222/0x26b [ 2547.488553] down_read_killable+0x75/0x490 [ 2547.489157] ? down_read_interruptible+0x490/0x490 [ 2547.490037] __access_remote_vm+0xac/0x6f0 [ 2547.490832] ? follow_phys+0x2c0/0x2c0 [ 2547.491551] ? do_raw_spin_lock+0x121/0x260 [ 2547.492178] ? rwlock_bug.part.0+0x90/0x90 [ 2547.492953] ? lock_release+0x3b2/0x750 [ 2547.493706] ? __up_console_sem+0x47/0x80 [ 2547.494498] get_mm_cmdline.part.0+0x214/0x600 [ 2547.495153] ? dname_to_vma_addr.isra.0+0x360/0x360 [ 2547.496047] ? _raw_spin_unlock_irqrestore+0x33/0x60 [ 2547.496983] get_task_cmdline_kernel+0x1e9/0x230 [ 2547.497854] dump_stack_print_cmdline.part.0+0x82/0x150 [ 2547.499191] ? _atomic_dec_and_lock_irqsave+0x150/0x150 [ 2547.500117] ? __wake_up_klogd.part.0+0xc5/0xf0 [ 2547.501014] ? dump_stack_print_info+0xc6/0x190 [ 2547.502063] dump_stack_print_info+0x185/0x190 [ 2547.502862] dump_stack_lvl+0x7f/0xb3 [ 2547.503597] should_fail.cold+0x5/0xa [ 2547.504196] _copy_from_user+0x2a/0x170 [ 2547.504940] copy_group_source_from_sockptr+0x54c/0x610 [ 2547.506293] ? ip_mcast_join_leave+0x290/0x290 [ 2547.507151] ? mark_lock.part.0+0xef/0x2f70 [ 2547.507957] ? perf_event_comm_output+0x7f0/0x7f0 [ 2547.508863] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2547.510098] ? __lock_acquire+0x164d/0x5e70 [ 2547.510912] ? __lock_acquire+0x164d/0x5e70 [ 2547.511726] do_mcast_group_source+0xb1/0x2c0 [ 2547.512611] ? copy_group_source_from_sockptr+0x610/0x610 [ 2547.513675] ? mark_lock.part.0+0xef/0x2f70 [ 2547.514311] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2547.515253] ? lock_chain_count+0x20/0x20 [ 2547.516111] ? perf_trace_run_bpf_submit+0xf5/0x1d0 [ 2547.517021] ? __local_bh_enable_ip+0xc7/0x130 [ 2547.517993] ? perf_trace_run_bpf_submit+0xf5/0x1d0 [ 2547.519062] ? __local_bh_enable_ip+0xa0/0x130 [ 2547.520073] ? lock_is_held_type+0xd7/0x130 [ 2547.521031] ? mark_held_locks+0x9e/0xe0 [ 2547.521914] ? __local_bh_enable_ip+0xa0/0x130 [ 2547.522879] ? __local_bh_enable_ip+0xa0/0x130 [ 2547.523887] ip_setsockopt+0xec0/0x35b0 [ 2547.524805] ? ip_sock_set_tos+0x30/0x30 [ 2547.525685] ? lock_release+0x3b2/0x750 [ 2547.526574] ? selinux_secmark_relabel_packet+0xd0/0xd0 [ 2547.527675] ? ksys_write+0x214/0x250 [ 2547.528577] ? lock_downgrade+0x6d0/0x6d0 [ 2547.529229] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 2547.530199] ? selinux_netlbl_sock_rcv_skb+0x540/0x540 [ 2547.531145] raw_setsockopt+0x27c/0x2c0 [ 2547.531907] ? raw_bind+0x4f0/0x4f0 [ 2547.532613] ? selinux_socket_setsockopt+0x6a/0x80 [ 2547.533485] ? sock_common_setsockopt+0x2b/0x100 [ 2547.534176] __sys_setsockopt+0x180/0x2b0 [ 2547.535271] ? sock_common_recvmsg+0x1a0/0x1a0 [ 2547.536131] ? __ia32_sys_recv+0x100/0x100 [ 2547.536943] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2547.537823] ? trace_rcu_dyntick+0x1a7/0x250 [ 2547.538660] __x64_sys_setsockopt+0xba/0x160 [ 2547.539451] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2547.540254] do_syscall_64+0x3b/0x90 [ 2547.540959] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2547.541890] RIP: 0033:0x7ffb0cd6cb19 [ 2547.542600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2547.545177] RSP: 002b:00007ffb0a2e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2547.546465] RAX: ffffffffffffffda RBX: 00007ffb0ce7ff60 RCX: 00007ffb0cd6cb19 [ 2547.547585] RDX: 000000000000002e RSI: 0000000000000000 RDI: 0000000000000005 [ 2547.548735] RBP: 00007ffb0a2e21d0 R08: 0000000000000108 R09: 0000000000000000 [ 2547.549861] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 2547.551024] R13: 00007fff05f1969f R14: 00007ffb0a2e2300 R15: 0000000000022000 [ 2547.552210] [ 2547.557545] syz-executor.6[11124] cmdline: /syz-executor.6 exec [ 2547.558295] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2547.559567] Call Trace: [ 2547.559822] [ 2547.560034] dump_stack_lvl+0x8b/0xb3 [ 2547.560530] should_fail.cold+0x5/0xa [ 2547.560901] _copy_from_user+0x2a/0x170 [ 2547.561275] copy_group_source_from_sockptr+0x54c/0x610 [ 2547.561887] ? ip_mcast_join_leave+0x290/0x290 [ 2547.562430] ? mark_lock.part.0+0xef/0x2f70 [ 2547.562845] ? perf_event_comm_output+0x7f0/0x7f0 [ 2547.563310] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2547.563920] ? __lock_acquire+0x164d/0x5e70 [ 2547.564442] ? __lock_acquire+0x164d/0x5e70 [ 2547.564859] do_mcast_group_source+0xb1/0x2c0 [ 2547.565281] ? copy_group_source_from_sockptr+0x610/0x610 [ 2547.565889] ? mark_lock.part.0+0xef/0x2f70 [ 2547.566288] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2547.566882] ? lock_chain_count+0x20/0x20 [ 2547.567265] ? perf_trace_run_bpf_submit+0xf5/0x1d0 [ 2547.567851] ? __local_bh_enable_ip+0xc7/0x130 [ 2547.568278] ? perf_trace_run_bpf_submit+0xf5/0x1d0 [ 2547.568849] ? __local_bh_enable_ip+0xa0/0x130 [ 2547.569271] ? lock_is_held_type+0xd7/0x130 [ 2547.569790] ? mark_held_locks+0x9e/0xe0 [ 2547.570174] ? __local_bh_enable_ip+0xa0/0x130 [ 2547.570701] ? __local_bh_enable_ip+0xa0/0x130 [ 2547.571127] ip_setsockopt+0xec0/0x35b0 [ 2547.571615] ? ip_sock_set_tos+0x30/0x30 [ 2547.571993] ? lock_release+0x3b2/0x750 [ 2547.572482] ? selinux_secmark_relabel_packet+0xd0/0xd0 [ 2547.572967] ? ksys_write+0x214/0x250 [ 2547.573441] ? lock_downgrade+0x6d0/0x6d0 [ 2547.573819] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 2547.574440] ? selinux_netlbl_sock_rcv_skb+0x540/0x540 [ 2547.574919] raw_setsockopt+0x27c/0x2c0 [ 2547.575286] ? raw_bind+0x4f0/0x4f0 [ 2547.575751] ? selinux_socket_setsockopt+0x6a/0x80 [ 2547.576223] ? sock_common_setsockopt+0x2b/0x100 [ 2547.576772] __sys_setsockopt+0x180/0x2b0 [ 2547.577151] ? sock_common_recvmsg+0x1a0/0x1a0 [ 2547.577680] ? __ia32_sys_recv+0x100/0x100 [ 2547.578068] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2547.578651] ? trace_rcu_dyntick+0x1a7/0x250 [ 2547.579070] __x64_sys_setsockopt+0xba/0x160 [ 2547.579587] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2547.580071] do_syscall_64+0x3b/0x90 [ 2547.580529] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2547.580998] RIP: 0033:0x7ffb0cd6cb19 [ 2547.581448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2547.583100] RSP: 002b:00007ffb0a2e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2547.583890] RAX: ffffffffffffffda RBX: 00007ffb0ce7ff60 RCX: 00007ffb0cd6cb19 [ 2547.584625] RDX: 000000000000002e RSI: 0000000000000000 RDI: 0000000000000005 [ 2547.585245] RBP: 00007ffb0a2e21d0 R08: 0000000000000108 R09: 0000000000000000 [ 2547.585991] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 2547.586729] R13: 00007fff05f1969f R14: 00007ffb0a2e2300 R15: 0000000000022000 [ 2547.587487] [ 2547.604982] loop6: detected capacity change from 0 to 256 [ 2547.612820] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:39:41 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x12004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="84f446a627a0b79c96e18fb3b522ae2bd2776c4056b0", 0x16, 0x8}], 0x41400, &(0x7f00000008c0)={[{@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xf791}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x0e\xd7\xc9\xc0a\xc9\xb8\xed\xdc\xcf\'\x96\f\xed\xd1\xcbh\xa7\xce\x03\xe4\x93\xf0\xc5=\x7f\x92\xbf\x04\xd4\xbd\xc6\xcbZ\x83\xe65\xec\x8e\x9f\xa2\x1e\x16a\xb4.\xc0Aw\x7f\x99\t97C y\xc46\f8\xa4\xff]\xc7\xf7\xc7\xee`\x01\xa5Uz\x94lF5\x9bE+?\x18j:\xf9n\x97OK\xd5\xba\xfew\xb8\x8b\x82<=7\xeb\a\xb3\xe4j\vD\x98\x05\xd1\xcaL\x02?\xc2x\f\x11\x86R_\x85a\xe9\xdf\x10\x85\xd7\xf4G{\xdc\x01\x00\x15\x9b\xed\x96_\x0e\xb4\xfe\x1e\x9fJA`\x9f\xf2Q\xc3\x10%o\x98\xe5?\x86\x9c\x83\xf2\xafk\x16A\xf0\xcb\xe26;6[o\xb8\x85p\t\xc5e\x03\x16\xa6\x95e*\xb1\xf4\xd6u,\x9b\xad\xc3\xbe]>\xc9\x04\x94\x97\xf4\xcc\xb7\x82\xa0J/r!\xfd\xb7cFg\x12\xf7eC\x98wN\xee\xbe\x1dL\xa0\xbb\xc2Q\x80\xfb\xe4c\n\"'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}]}) syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000700)=[{&(0x7f0000000580)="307fd83f37307fe36792f155cda41e63395d9fa70d5f65426cd0f99544deadd4f040ae29110f38424f438c7d7178997cdc44606a9a5643d3e0277a967cd520d64d89eb12b9226a1e59dfb9d8d05c9a7fd47a4d0cc9699bed4fa9200c2463a769f0b37ef8a55639b2d8e4ebbbda4814a776a4bf0d76ea7136d40130a2590818c4b2e9ccd3bb51ed855b40fd8c9879180966a8e3f679c3aff134ef87ecf54ab3c1cf7fdc5028c02623498248b65f35c8a49165b516411caa14772d9b7ec43c211768fd062a720c4290956a8bf2aa10938aa242a1dd8c1390bffbd5d6347918dcd3dd4c273e65893219485715890f027c2f27bc", 0xf2, 0xb57}, {&(0x7f00000003c0)="01bce4a60062054466685e5e89fec51a2662afc9dcf3b3d34bf69ca66bdd251c5c92804e0ca3b504178ed21f9e1a6f58388df02516e97d44", 0x38, 0x7fffffff}, {&(0x7f0000000680)="69111519a3ba39a46804b0639430882a54041b6ceb08e7eb5691dba6fa7e319b9b3e5aebdb2fded1a89be2ead5c765eb30e18a9dd92eb240c9c143c5e114e94f633341778aad25982e1fed20561a8aeedeb095b338883e35d4f7e3574d9e3b4bbfb12135e5e6027a54a0", 0x6a, 0x2}], 0x1860000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x1}}, {@map_off}, {@check_strict}, {@nocompress}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@measure}]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@hci, &(0x7f0000000300)=0x80) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f800002000400003000000000000", 0x23}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 2547.834066] loop7: detected capacity change from 0 to 264192 [ 2547.851084] loop7: detected capacity change from 0 to 264192 [ 2547.863177] loop7: detected capacity change from 0 to 256 [ 2547.873522] FAT-fs (loop7): bogus number of FAT sectors [ 2547.874286] FAT-fs (loop7): Can't find a valid FAT filesystem VM DIAGNOSIS: 16:39:41 Registers: info registers vcpu 0 RAX=000000000000006f RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff8240add1 RDI=ffffffff8762a6c0 RBP=ffffffff8762a680 RSP=ffff8880442a6dd8 R8 =0000000000000001 R9 =000000000000000a R10=000000000000006f R11=0000000000000001 R12=000000000000006f R13=ffffffff8762a680 R14=0000000000000010 R15=ffffffff8240adc0 RIP=ffffffff8240ae29 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007ffb0a2e2700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ff74fe7c6d0 CR3=000000000eaa2000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffff00 YMM05=0000000000000000 0000000000000000 3037333730343437 36343438313c7265 YMM06=0000000000000000 0000000000000000 6e776f662c737365 72706d6f636f6e2c YMM07=0000000000000000 0000000000000000 7463697274733d6b 636568632c66666f YMM08=0000000000000000 0000000000000000 01dc7b47f4d78510 dfe961855f528611 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000002 RBX=000000000003433e RCX=ffffc900021ec000 RDX=ffff88800fb55100 RSI=ffffffff8168e240 RDI=0000000000000006 RBP=1ffff11008b86ecf RSP=ffff888045c37668 R8 =0000000000000006 R9 =000000000003433e R10=000000000007ffdf R11=0000000000000001 R12=ffff8880099f9700 R13=00007ff30a023000 R14=000000000007ffdf R15=0000000000000000 RIP=ffffffff8145a203 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007ff30780b700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000020010000 CR3=00000000180ce000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000