000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x900000000000000, 0x0)
[ 2245.802324] loop5: detected capacity change from 0 to 264192
[ 2245.803436] loop7: detected capacity change from 0 to 215922
[ 2245.809785] loop6: detected capacity change from 0 to 215922
[ 2245.810437] loop4: detected capacity change from 0 to 215922
[ 2245.843276] FAULT_INJECTION: forcing a failure.
[ 2245.843276] name failslab, interval 1, probability 0, space 0, times 0
[ 2245.843313] CPU: 1 PID: 9658 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2245.843342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2245.843360] Call Trace:
[ 2245.843368]
[ 2245.843383] dump_stack_lvl+0x8b/0xb3
[ 2245.843421] should_fail.cold+0x5/0xa
[ 2245.843448] ? create_object.isra.0+0x3a/0xa20
[ 2245.843488] should_failslab+0x5/0x10
[ 2245.843522] kmem_cache_alloc+0x5b/0x480
[ 2245.843572] create_object.isra.0+0x3a/0xa20
[ 2245.843605] ? kasan_unpoison+0x23/0x50
[ 2245.843644] kmem_cache_alloc+0x239/0x480
[ 2245.843693] getname_flags.part.0+0x50/0x4f0
[ 2245.843727] ? kmem_cache_free+0xe0/0x420
[ 2245.843774] getname_flags+0x9a/0xe0
[ 2245.843811] vfs_fstatat+0x73/0xb0
[ 2245.843856] __do_sys_newstat+0x88/0x110
[ 2245.843896] ? __ia32_sys_stat+0x70/0x70
[ 2245.843934] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2245.843974] ? xfd_validate_state+0x59/0x180
[ 2245.844016] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2245.844070] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2245.844112] ? lockdep_hardirqs_on+0x79/0x100
[ 2245.844153] do_syscall_64+0x3b/0x90
[ 2245.844183] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2245.844220] RIP: 0033:0x7f1d2141db16
[ 2245.844239] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2245.844265] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2245.844290] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141db16
[ 2245.844308] RDX: 00007f1d1e993fc0 RSI: 00007f1d1e993fc0 RDI: 00007f1d1e993f40
[ 2245.844325] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90
[ 2245.844341] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000007
[ 2245.844357] R13: 00007f1d1e993fc0 R14: 0000000000000000 R15: 00007f1d1e993f80
[ 2245.844402]
[ 2245.848015] loop2: detected capacity change from 0 to 215922
[ 2245.864296] FAULT_INJECTION: forcing a failure.
[ 2245.864296] name failslab, interval 1, probability 0, space 0, times 0
21:23:49 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x800000000000000, 0x0)
21:23:49 executing program 7:
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 87)
21:23:49 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x1800000000000000, 0x0)
21:23:49 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 81)
[ 2245.864325] CPU: 1 PID: 9654 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2245.864349] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2245.864363] Call Trace:
21:23:49 executing program 5:
syz_read_part_table(0xf6ffffff, 0x0, 0x0)
21:23:49 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x2284, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:23:49 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x2282, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2245.864369]
[ 2245.864376] dump_stack_lvl+0x8b/0xb3
[ 2245.864404] should_fail.cold+0x5/0xa
[ 2245.864426] ? getname_flags.part.0+0x50/0x4f0
[ 2245.864458] should_failslab+0x5/0x10
[ 2245.864501] kmem_cache_alloc+0x5b/0x480
[ 2245.864532] ? putname+0xfe/0x140
[ 2245.864565] getname_flags.part.0+0x50/0x4f0
[ 2245.864594] ? kmem_cache_free+0xe0/0x420
[ 2245.864633] getname_flags+0x9a/0xe0
[ 2245.864664] vfs_fstatat+0x73/0xb0
[ 2245.864701] __do_sys_newstat+0x88/0x110
[ 2245.864734] ? __ia32_sys_stat+0x70/0x70
[ 2245.864766] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2245.864799] ? xfd_validate_state+0x59/0x180
[ 2245.864832] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2245.864877] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2245.864911] ? lockdep_hardirqs_on+0x79/0x100
[ 2245.864945] do_syscall_64+0x3b/0x90
[ 2245.864970] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2245.864999] RIP: 0033:0x7f5b6be25b16
[ 2245.865015] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
21:23:49 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x6400000000000000, 0x0)
[ 2245.865035] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2245.865056] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16
[ 2245.865071] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40
[ 2245.865084] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2245.865097] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000006
[ 2245.865110] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2245.865147]
[ 2245.866983] loop5: detected capacity change from 0 to 264192
[ 2245.875228] 9pnet_fd: p9_fd_create_tcp (9657): problem connecting socket to 127.0.0.1
[ 2245.908858] loop2: detected capacity change from 0 to 215922
[ 2246.119019] loop4: detected capacity change from 0 to 215922
[ 2246.127922] loop7: detected capacity change from 0 to 215922
[ 2246.134641] FAULT_INJECTION: forcing a failure.
[ 2246.134641] name failslab, interval 1, probability 0, space 0, times 0
[ 2246.134673] CPU: 1 PID: 9673 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2246.134697] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2246.134717] Call Trace:
[ 2246.134724]
[ 2246.134732] dump_stack_lvl+0x8b/0xb3
[ 2246.134764] should_fail.cold+0x5/0xa
[ 2246.134792] should_failslab+0x5/0x10
[ 2246.134822] kmem_cache_alloc_lru+0x60/0x7c0
[ 2246.134856] ? __d_alloc+0x31/0x990
[ 2246.134888] __d_alloc+0x31/0x990
[ 2246.134918] d_alloc_parallel+0x10a/0x1c00
[ 2246.134942] ? __lock_acquire+0x164e/0x6120
[ 2246.134992] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2246.135024] ? find_held_lock+0x2c/0x110
[ 2246.135050] ? __d_lookup_rcu+0x730/0x730
[ 2246.135079] ? lockdep_init_map_type+0x21a/0x7e0
[ 2246.135111] ? lockdep_init_map_type+0x21a/0x7e0
[ 2246.135153] __lookup_slow+0x193/0x490
[ 2246.135181] ? page_put_link+0x1f0/0x1f0
[ 2246.135214] ? p9_pollwake+0x100/0x170
[ 2246.135253] ? p9_pollwake+0x100/0x170
[ 2246.135283] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[ 2246.135318] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2246.135351] ? link_path_walk.part.0+0x154/0xf80
[ 2246.135386] walk_component+0x411/0x6a0
[ 2246.135415] ? handle_dots.part.0+0x1500/0x1500
[ 2246.135445] ? path_init+0x17b0/0x17b0
[ 2246.135488] path_lookupat+0x1ba/0x850
[ 2246.135527] filename_lookup+0x1c6/0x590
[ 2246.135560] ? may_linkat+0x500/0x500
[ 2246.135602] ? find_held_lock+0x2c/0x110
[ 2246.135632] ? lock_release+0x3b2/0x750
[ 2246.135658] ? __might_fault+0xd1/0x170
[ 2246.135691] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 2246.135725] ? __virt_addr_valid+0xe9/0x350
[ 2246.135756] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2246.135789] ? is_vmalloc_addr+0x7b/0xb0
[ 2246.135816] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[ 2246.135849] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2246.135881] ? __check_object_size+0x1b5/0x890
[ 2246.135921] vfs_statx+0x148/0x390
[ 2246.135961] ? inode_sub_bytes+0x100/0x100
[ 2246.135992] ? getname_flags.part.0+0x1dd/0x4f0
[ 2246.136021] ? kmem_cache_free+0xe0/0x420
[ 2246.136067] vfs_fstatat+0x8c/0xb0
[ 2246.136105] __do_sys_newstat+0x88/0x110
[ 2246.136139] ? __ia32_sys_stat+0x70/0x70
[ 2246.136171] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2246.136203] ? xfd_validate_state+0x59/0x180
[ 2246.136239] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2246.136286] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2246.136321] ? lockdep_hardirqs_on+0x79/0x100
[ 2246.136356] do_syscall_64+0x3b/0x90
[ 2246.136382] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2246.136411] RIP: 0033:0x7f1d2141db16
[ 2246.136429] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2246.136450] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2246.136471] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141db16
[ 2246.136498] RDX: 00007f1d1e993fc0 RSI: 00007f1d1e993fc0 RDI: 00007f1d1e993f40
[ 2246.136513] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90
[ 2246.136526] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000006
[ 2246.136539] R13: 00007f1d1e993fc0 R14: 0000000000000000 R15: 00007f1d1e993f80
[ 2246.136578]
[ 2246.163798] loop5: detected capacity change from 0 to 264192
[ 2246.205344] loop5: detected capacity change from 0 to 264192
[ 2246.207901] loop6: detected capacity change from 0 to 215922
[ 2246.222373] FAULT_INJECTION: forcing a failure.
[ 2246.222373] name failslab, interval 1, probability 0, space 0, times 0
[ 2246.222405] CPU: 1 PID: 9681 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2246.222429] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2246.222445] Call Trace:
[ 2246.222450]
[ 2246.222458] dump_stack_lvl+0x8b/0xb3
[ 2246.222490] should_fail.cold+0x5/0xa
[ 2246.222513] ? getname_flags.part.0+0x50/0x4f0
[ 2246.222546] should_failslab+0x5/0x10
[ 2246.222574] kmem_cache_alloc+0x5b/0x480
[ 2246.222613] ? putname+0xfe/0x140
[ 2246.222650] getname_flags.part.0+0x50/0x4f0
[ 2246.222678] ? kmem_cache_free+0xe0/0x420
[ 2246.222717] getname_flags+0x9a/0xe0
[ 2246.222748] vfs_fstatat+0x73/0xb0
[ 2246.222785] __do_sys_newstat+0x88/0x110
[ 2246.222819] ? __ia32_sys_stat+0x70/0x70
[ 2246.222851] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2246.222884] ? xfd_validate_state+0x59/0x180
[ 2246.222920] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2246.222965] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2246.223001] ? lockdep_hardirqs_on+0x79/0x100
[ 2246.223035] do_syscall_64+0x3b/0x90
[ 2246.223060] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2246.223090] RIP: 0033:0x7f5b6be25b16
[ 2246.223107] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2246.223129] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2246.223150] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16
[ 2246.223165] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40
[ 2246.223179] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2246.223193] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000006
[ 2246.223207] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2246.223244]
[ 2246.255192] loop2: detected capacity change from 0 to 215922
[ 2246.323930] loop2: detected capacity change from 0 to 215922
21:24:05 executing program 7:
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 88)
21:24:05 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x900000000000000, 0x0)
21:24:05 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x2285, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:24:05 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:24:05 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x2283, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:24:05 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x8004000000000000, 0x0)
21:24:05 executing program 5:
syz_read_part_table(0xfcfdffff, 0x0, 0x0)
21:24:05 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 82)
[ 2262.309330] loop7: detected capacity change from 0 to 215922
[ 2262.325381] loop2: detected capacity change from 0 to 215922
21:24:06 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x8cffffff00000000, 0x0)
21:24:06 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x1800000000000000, 0x0)
[ 2262.380318] loop5: detected capacity change from 0 to 264192
[ 2262.383892] 9pnet_fd: p9_fd_create_tcp (9703): problem connecting socket to 127.0.0.1
[ 2262.389768] FAULT_INJECTION: forcing a failure.
[ 2262.389768] name failslab, interval 1, probability 0, space 0, times 0
[ 2262.389803] CPU: 1 PID: 9705 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2262.389824] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2262.389837] Call Trace:
[ 2262.389843]
[ 2262.389851] dump_stack_lvl+0x8b/0xb3
[ 2262.389884] should_fail.cold+0x5/0xa
[ 2262.389901] ? create_object.isra.0+0x3a/0xa20
[ 2262.389926] should_failslab+0x5/0x10
[ 2262.389948] kmem_cache_alloc+0x5b/0x480
[ 2262.389990] create_object.isra.0+0x3a/0xa20
[ 2262.390017] ? kasan_unpoison+0x23/0x50
[ 2262.390046] kmem_cache_alloc_lru+0x2d3/0x7c0
[ 2262.390075] ? __d_alloc+0x31/0x990
[ 2262.390103] __d_alloc+0x31/0x990
[ 2262.390130] d_alloc_parallel+0x10a/0x1c00
[ 2262.390151] ? __lock_acquire+0x164e/0x6120
[ 2262.390197] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2262.390222] ? find_held_lock+0x2c/0x110
[ 2262.390244] ? __d_lookup_rcu+0x730/0x730
[ 2262.390270] ? lockdep_init_map_type+0x21a/0x7e0
[ 2262.390297] ? lockdep_init_map_type+0x21a/0x7e0
[ 2262.390335] __lookup_slow+0x193/0x490
[ 2262.390360] ? page_put_link+0x1f0/0x1f0
[ 2262.390395] ? p9_pollwake+0x100/0x170
[ 2262.390431] ? p9_pollwake+0x100/0x170
[ 2262.390456] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[ 2262.390487] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2262.390517] ? link_path_walk.part.0+0x154/0xf80
[ 2262.390549] walk_component+0x411/0x6a0
[ 2262.390574] ? handle_dots.part.0+0x1500/0x1500
[ 2262.390600] ? path_init+0x17b0/0x17b0
[ 2262.390636] path_lookupat+0x1ba/0x850
[ 2262.390671] filename_lookup+0x1c6/0x590
[ 2262.390699] ? may_linkat+0x500/0x500
[ 2262.390735] ? find_held_lock+0x2c/0x110
[ 2262.390761] ? lock_release+0x3b2/0x750
[ 2262.390784] ? __might_fault+0xd1/0x170
[ 2262.390814] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 2262.390842] ? __virt_addr_valid+0xe9/0x350
[ 2262.390871] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2262.390902] ? is_vmalloc_addr+0x7b/0xb0
[ 2262.390929] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[ 2262.390957] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2262.390985] ? __check_object_size+0x1b5/0x890
[ 2262.391018] vfs_statx+0x148/0x390
[ 2262.391054] ? inode_sub_bytes+0x100/0x100
21:24:06 executing program 7:
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 89)
[ 2262.391080] ? getname_flags.part.0+0x1dd/0x4f0
[ 2262.391104] ? kmem_cache_free+0xe0/0x420
[ 2262.391144] vfs_fstatat+0x8c/0xb0
[ 2262.391176] __do_sys_newstat+0x88/0x110
[ 2262.391205] ? __ia32_sys_stat+0x70/0x70
[ 2262.391233] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2262.391261] ? xfd_validate_state+0x59/0x180
[ 2262.391294] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2262.391336] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2262.391374] ? lockdep_hardirqs_on+0x79/0x100
[ 2262.391404] do_syscall_64+0x3b/0x90
[ 2262.391427] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2262.391453] RIP: 0033:0x7f1d2141db16
[ 2262.391467] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2262.391486] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2262.391506] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141db16
[ 2262.391519] RDX: 00007f1d1e993fc0 RSI: 00007f1d1e993fc0 RDI: 00007f1d1e993f40
[ 2262.391523] loop6: detected capacity change from 0 to 215922
[ 2262.391532] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90
[ 2262.391545] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000006
[ 2262.391558] R13: 00007f1d1e993fc0 R14: 0000000000000000 R15: 00007f1d1e993f80
[ 2262.391593]
[ 2262.407557] FAULT_INJECTION: forcing a failure.
[ 2262.407557] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2262.407705] CPU: 0 PID: 9702 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2262.407727] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2262.407738] Call Trace:
[ 2262.407742]
[ 2262.407749] dump_stack_lvl+0x8b/0xb3
[ 2262.407773] should_fail.cold+0x5/0xa
[ 2262.407795] strncpy_from_user+0x34/0x3d0
[ 2262.407828] getname_flags.part.0+0x95/0x4f0
[ 2262.407855] ? kmem_cache_free+0xe0/0x420
[ 2262.407891] getname_flags+0x9a/0xe0
[ 2262.407919] vfs_fstatat+0x73/0xb0
[ 2262.407950] __do_sys_newstat+0x88/0x110
[ 2262.407977] ? __ia32_sys_stat+0x70/0x70
[ 2262.408002] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2262.408028] ? xfd_validate_state+0x59/0x180
[ 2262.408056] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2262.408091] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2262.408117] ? lockdep_hardirqs_on+0x79/0x100
[ 2262.408144] do_syscall_64+0x3b/0x90
[ 2262.408163] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2262.408186] RIP: 0033:0x7f5b6be25b16
[ 2262.408198] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
21:24:06 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:24:06 executing program 5:
syz_read_part_table(0xfdfdffff, 0x0, 0x0)
21:24:06 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x2286, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:24:06 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 83)
21:24:06 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x2284, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2262.408214] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2262.408229] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16
[ 2262.408240] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40
[ 2262.408251] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2262.408261] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000006
[ 2262.408273] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2262.408303]
[ 2262.412315] loop4: detected capacity change from 0 to 215922
[ 2262.422873] loop5: detected capacity change from 0 to 264192
[ 2262.447218] loop2: detected capacity change from 0 to 215922
21:24:06 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xb3e5960600000000, 0x0)
[ 2262.590979] loop7: detected capacity change from 0 to 215922
[ 2262.599371] FAULT_INJECTION: forcing a failure.
[ 2262.599371] name failslab, interval 1, probability 0, space 0, times 0
[ 2262.599397] CPU: 0 PID: 9724 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2262.599418] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2262.599429] Call Trace:
[ 2262.599434]
[ 2262.599440] dump_stack_lvl+0x8b/0xb3
[ 2262.599464] should_fail.cold+0x5/0xa
[ 2262.599481] ? getname_flags.part.0+0x50/0x4f0
[ 2262.599508] should_failslab+0x5/0x10
[ 2262.599533] kmem_cache_alloc+0x5b/0x480
[ 2262.599561] ? putname+0xfe/0x140
[ 2262.599595] getname_flags.part.0+0x50/0x4f0
[ 2262.599620] ? kmem_cache_free+0xe0/0x420
[ 2262.599654] getname_flags+0x9a/0xe0
[ 2262.599682] vfs_fstatat+0x73/0xb0
[ 2262.599714] __do_sys_newstat+0x88/0x110
[ 2262.599744] ? __ia32_sys_stat+0x70/0x70
[ 2262.599772] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2262.599802] ? xfd_validate_state+0x59/0x180
[ 2262.599833] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2262.599874] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2262.599909] ? lockdep_hardirqs_on+0x79/0x100
[ 2262.599938] do_syscall_64+0x3b/0x90
[ 2262.599961] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2262.599988] RIP: 0033:0x7f1d2141db16
[ 2262.600001] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2262.600019] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2262.600037] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141db16
[ 2262.600050] RDX: 00007f1d1e993fc0 RSI: 00007f1d1e993fc0 RDI: 00007f1d1e993f40
[ 2262.600062] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90
[ 2262.600074] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000007
[ 2262.600085] R13: 00007f1d1e993fc0 R14: 0000000000000000 R15: 00007f1d1e993f80
[ 2262.600119]
[ 2262.631873] loop4: detected capacity change from 0 to 215922
[ 2262.660026] loop6: detected capacity change from 0 to 215922
[ 2262.660857] loop5: detected capacity change from 0 to 264192
[ 2262.667453] FAULT_INJECTION: forcing a failure.
[ 2262.667453] name failslab, interval 1, probability 0, space 0, times 0
[ 2262.667887] CPU: 0 PID: 9729 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2262.667911] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2262.667923] Call Trace:
[ 2262.667928]
[ 2262.667935] dump_stack_lvl+0x8b/0xb3
[ 2262.667964] should_fail.cold+0x5/0xa
[ 2262.667988] ? getname_flags.part.0+0x50/0x4f0
[ 2262.668022] should_failslab+0x5/0x10
[ 2262.668051] kmem_cache_alloc+0x5b/0x480
[ 2262.668086] ? putname+0xfe/0x140
[ 2262.668122] getname_flags.part.0+0x50/0x4f0
[ 2262.668153] ? kmem_cache_free+0xe0/0x420
[ 2262.668189] getname_flags+0x9a/0xe0
[ 2262.668216] vfs_fstatat+0x73/0xb0
[ 2262.668249] __do_sys_newstat+0x88/0x110
[ 2262.668278] ? __ia32_sys_stat+0x70/0x70
[ 2262.668306] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2262.668335] ? xfd_validate_state+0x59/0x180
[ 2262.668366] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2262.668406] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2262.668435] ? lockdep_hardirqs_on+0x79/0x100
[ 2262.668464] do_syscall_64+0x3b/0x90
[ 2262.668544] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2262.668572] RIP: 0033:0x7f5b6be25b16
[ 2262.668590] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2262.668611] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2262.668629] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16
[ 2262.668641] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40
[ 2262.668653] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2262.668665] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000006
[ 2262.668677] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2262.668711]
[ 2262.674380] loop5: detected capacity change from 0 to 264192
[ 2262.675456] loop2: detected capacity change from 0 to 215922
[ 2262.693152] 9pnet_fd: p9_fd_create_tcp (9736): problem connecting socket to 127.0.0.1
[ 2262.704985] loop2: detected capacity change from 0 to 215922
21:24:23 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x6400000000000000, 0x0)
21:24:23 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x2287, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:24:23 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:24:23 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xf6ffffff00000000, 0x0)
21:24:23 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 84)
21:24:23 executing program 5:
syz_read_part_table(0xfdffffff, 0x0, 0x0)
21:24:23 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x2285, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:24:23 executing program 7:
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 90)
21:24:23 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xfcfdffff00000000, 0x0)
[ 2280.253357] loop6: detected capacity change from 0 to 215922
[ 2280.272090] loop5: detected capacity change from 0 to 264192
[ 2280.273889] 9pnet_fd: p9_fd_create_tcp (9756): problem connecting socket to 127.0.0.1
[ 2280.302348] loop4: detected capacity change from 0 to 215922
[ 2280.324478] loop7: detected capacity change from 0 to 215922
[ 2280.330489] loop5: detected capacity change from 0 to 264192
[ 2280.343359] FAULT_INJECTION: forcing a failure.
[ 2280.343359] name failslab, interval 1, probability 0, space 0, times 0
[ 2280.343388] CPU: 0 PID: 9750 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2280.343413] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2280.343425] Call Trace:
[ 2280.343431]
[ 2280.343437] dump_stack_lvl+0x8b/0xb3
[ 2280.343462] should_fail.cold+0x5/0xa
[ 2280.343481] ? getname_flags.part.0+0x50/0x4f0
[ 2280.343509] should_failslab+0x5/0x10
[ 2280.343532] kmem_cache_alloc+0x5b/0x480
[ 2280.343557] ? putname+0xfe/0x140
[ 2280.343584] getname_flags.part.0+0x50/0x4f0
[ 2280.343608] ? kmem_cache_free+0xe0/0x420
21:24:24 executing program 5:
syz_read_part_table(0xfeffffff, 0x0, 0x0)
[ 2280.343640] getname_flags+0x9a/0xe0
[ 2280.343664] vfs_fstatat+0x73/0xb0
[ 2280.343695] __do_sys_newstat+0x88/0x110
[ 2280.343724] ? __ia32_sys_stat+0x70/0x70
[ 2280.343749] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
21:24:24 executing program 7:
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 91)
21:24:24 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x2288, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2280.343774] ? xfd_validate_state+0x59/0x180
[ 2280.343799] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2280.343833] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2280.343859] ? lockdep_hardirqs_on+0x79/0x100
[ 2280.343885] do_syscall_64+0x3b/0x90
[ 2280.343903] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2280.343926] RIP: 0033:0x7f5b6be25b16
[ 2280.343938] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2280.343954] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2280.343969] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16
[ 2280.343979] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40
[ 2280.343989] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2280.343999] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000006
[ 2280.344009] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2280.344033]
[ 2280.355969] FAULT_INJECTION: forcing a failure.
[ 2280.355969] name failslab, interval 1, probability 0, space 0, times 0
[ 2280.355996] CPU: 0 PID: 9764 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2280.356015] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2280.356027] Call Trace:
[ 2280.356033]
[ 2280.356040] dump_stack_lvl+0x8b/0xb3
[ 2280.356066] should_fail.cold+0x5/0xa
[ 2280.356086] ? kobject_uevent_env+0x236/0xfa0
[ 2280.356111] should_failslab+0x5/0x10
[ 2280.356135] kmem_cache_alloc_trace+0x55/0x3c0
[ 2280.356170] kobject_uevent_env+0x236/0xfa0
[ 2280.356192] ? dev_uevent_filter+0xd0/0xd0
[ 2280.356215] ? kernfs_put+0x42/0x50
[ 2280.356249] __loop_clr_fd+0x2f8/0x8b0
[ 2280.356278] lo_ioctl+0x632/0x1990
[ 2280.356302] ? vfs_fstatat+0x97/0xb0
[ 2280.356335] ? loop_set_status_old+0x1b0/0x1b0
[ 2280.356358] ? avc_ss_reset+0x180/0x180
[ 2280.356404] ? __lock_acquire+0xbac/0x6120
[ 2280.356444] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2280.356473] ? lock_is_held_type+0xd7/0x130
[ 2280.356497] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2280.356528] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[ 2280.356557] ? do_vfs_ioctl+0x132/0x1610
[ 2280.356592] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2280.356622] ? blkdev_common_ioctl+0x1ad/0x1990
[ 2280.356641] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400
[ 2280.356670] ? blkdev_bszset+0x1f0/0x1f0
[ 2280.356689] ? selinux_inode_getsecctx+0x90/0x90
[ 2280.356720] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2280.356750] ? __ia32_sys_stat+0x70/0x70
[ 2280.356780] ? loop_set_status_old+0x1b0/0x1b0
[ 2280.356808] blkdev_ioctl+0x356/0x7f0
[ 2280.356827] ? blkdev_common_ioctl+0x1990/0x1990
[ 2280.356846] ? selinux_file_ioctl+0xb1/0x260
[ 2280.356875] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2280.356903] ? blkdev_common_ioctl+0x1990/0x1990
[ 2280.356926] __x64_sys_ioctl+0x196/0x210
[ 2280.356956] do_syscall_64+0x3b/0x90
[ 2280.356978] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2280.357022] RIP: 0033:0x7f1d2141e8d7
[ 2280.357036] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2280.357053] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 2280.357070] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141e8d7
[ 2280.357082] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005
[ 2280.357093] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90
[ 2280.357104] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000008
[ 2280.357115] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f1d1e993f80
[ 2280.357146]
[ 2280.374694] loop2: detected capacity change from 0 to 215922
[ 2280.416350] loop2: detected capacity change from 0 to 215922
[ 2280.479244] loop5: detected capacity change from 0 to 264192
[ 2280.508171] loop5: detected capacity change from 0 to 264192
[ 2280.580845] loop7: detected capacity change from 0 to 215922
[ 2280.583272] loop4: detected capacity change from 0 to 215922
[ 2280.594042] FAULT_INJECTION: forcing a failure.
[ 2280.594042] name failslab, interval 1, probability 0, space 0, times 0
[ 2280.594071] CPU: 0 PID: 9778 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2280.594089] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2280.594100] Call Trace:
[ 2280.594105]
[ 2280.594112] dump_stack_lvl+0x8b/0xb3
[ 2280.594136] should_fail.cold+0x5/0xa
[ 2280.594153] ? create_object.isra.0+0x3a/0xa20
[ 2280.594178] should_failslab+0x5/0x10
[ 2280.594199] kmem_cache_alloc+0x5b/0x480
[ 2280.594229] create_object.isra.0+0x3a/0xa20
[ 2280.594249] ? kasan_unpoison+0x23/0x50
[ 2280.594272] kmem_cache_alloc+0x239/0x480
[ 2280.594309] getname_flags.part.0+0x50/0x4f0
[ 2280.594336] ? kmem_cache_free+0xe0/0x420
[ 2280.594365] getname_flags+0x9a/0xe0
[ 2280.594390] vfs_fstatat+0x73/0xb0
[ 2280.594421] __do_sys_newstat+0x88/0x110
[ 2280.594449] ? __ia32_sys_stat+0x70/0x70
[ 2280.594475] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2280.594503] ? xfd_validate_state+0x59/0x180
[ 2280.594531] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2280.594569] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2280.594599] ? lockdep_hardirqs_on+0x79/0x100
[ 2280.594627] do_syscall_64+0x3b/0x90
[ 2280.594648] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2280.594674] RIP: 0033:0x7f1d2141db16
[ 2280.594687] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2280.594704] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2280.594722] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141db16
[ 2280.594735] RDX: 00007f1d1e993fc0 RSI: 00007f1d1e993fc0 RDI: 00007f1d1e993f40
[ 2280.594747] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90
[ 2280.594759] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000007
[ 2280.594771] R13: 00007f1d1e993fc0 R14: 0000000000000000 R15: 00007f1d1e993f80
[ 2280.594802]
[ 2296.782768] loop7: detected capacity change from 0 to 215922
21:24:40 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xfeffffff00000000, 0x0)
21:24:40 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:24:40 executing program 7:
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 92)
21:24:40 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x2286, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:24:40 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 85)
21:24:40 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x8004000000000000, 0x0)
21:24:40 executing program 5:
syz_read_part_table(0xfffff000, 0x0, 0x0)
21:24:40 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x2289, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2296.802432] loop5: detected capacity change from 0 to 264192
[ 2296.809550] FAULT_INJECTION: forcing a failure.
[ 2296.809550] name failslab, interval 1, probability 0, space 0, times 0
[ 2296.809626] CPU: 1 PID: 9786 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2296.809644] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2296.809654] Call Trace:
[ 2296.809659]
[ 2296.809666] dump_stack_lvl+0x8b/0xb3
[ 2296.809691] should_fail.cold+0x5/0xa
[ 2296.809710] should_failslab+0x5/0x10
[ 2296.809731] kmem_cache_alloc_lru+0x60/0x7c0
[ 2296.809755] ? __d_alloc+0x31/0x990
[ 2296.809777] __d_alloc+0x31/0x990
[ 2296.809800] d_alloc_parallel+0x10a/0x1c00
[ 2296.809816] ? __lock_acquire+0x164e/0x6120
[ 2296.809851] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2296.809869] ? find_held_lock+0x2c/0x110
[ 2296.809887] ? __d_lookup_rcu+0x730/0x730
[ 2296.809907] ? lockdep_init_map_type+0x21a/0x7e0
[ 2296.809928] ? lockdep_init_map_type+0x21a/0x7e0
[ 2296.809956] __lookup_slow+0x193/0x490
[ 2296.809976] ? page_put_link+0x1f0/0x1f0
[ 2296.809998] ? p9_pollwake+0x100/0x170
[ 2296.810026] ? p9_pollwake+0x100/0x170
[ 2296.810045] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[ 2296.810071] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2296.810093] ? link_path_walk.part.0+0x154/0xf80
[ 2296.810117] walk_component+0x411/0x6a0
[ 2296.810136] ? handle_dots.part.0+0x1500/0x1500
[ 2296.810156] ? path_init+0x17b0/0x17b0
[ 2296.810185] path_lookupat+0x1ba/0x850
[ 2296.810211] filename_lookup+0x1c6/0x590
[ 2296.810233] ? may_linkat+0x500/0x500
[ 2296.810261] ? find_held_lock+0x2c/0x110
[ 2296.810281] ? lock_release+0x3b2/0x750
[ 2296.810298] ? __might_fault+0xd1/0x170
[ 2296.810321] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 2296.810344] ? __virt_addr_valid+0xe9/0x350
[ 2296.810369] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2296.810392] ? is_vmalloc_addr+0x7b/0xb0
[ 2296.810412] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[ 2296.810434] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2296.810456] ? __check_object_size+0x1b5/0x890
[ 2296.810484] vfs_statx+0x148/0x390
[ 2296.810511] ? inode_sub_bytes+0x100/0x100
[ 2296.810531] ? getname_flags.part.0+0x1dd/0x4f0
[ 2296.810558] ? kmem_cache_free+0xe0/0x420
[ 2296.810595] vfs_fstatat+0x8c/0xb0
[ 2296.810620] __do_sys_newstat+0x88/0x110
[ 2296.810643] ? __ia32_sys_stat+0x70/0x70
[ 2296.810664] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2296.810686] ? xfd_validate_state+0x59/0x180
[ 2296.810710] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2296.810742] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2296.810767] ? lockdep_hardirqs_on+0x79/0x100
[ 2296.810790] do_syscall_64+0x3b/0x90
[ 2296.810808] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2296.810829] RIP: 0033:0x7f1d2141db16
[ 2296.810841] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2296.810856] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2296.810871] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141db16
[ 2296.810881] RDX: 00007f1d1e993fc0 RSI: 00007f1d1e993fc0 RDI: 00007f1d1e993f40
[ 2296.810891] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90
21:24:40 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x8cffffff00000000, 0x0)
[ 2296.810901] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000007
[ 2296.810910] R13: 00007f1d1e993fc0 R14: 0000000000000000 R15: 00007f1d1e993f80
[ 2296.810937]
[ 2296.847794] loop6: detected capacity change from 0 to 215922
21:24:40 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 86)
[ 2296.853261] loop2: detected capacity change from 0 to 215922
[ 2296.853989] loop5: detected capacity change from 0 to 264192
21:24:40 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x2287, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2296.854140] 9pnet_fd: p9_fd_create_tcp (9799): problem connecting socket to 127.0.0.1
[ 2296.854564] FAULT_INJECTION: forcing a failure.
[ 2296.854564] name failslab, interval 1, probability 0, space 0, times 0
21:24:40 executing program 7:
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 93)
21:24:40 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xfeffffffffffffff, 0x0)
21:24:40 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 87)
[ 2296.854758] CPU: 1 PID: 9798 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2296.854776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2296.854787] Call Trace:
[ 2296.854791]
[ 2296.854796] dump_stack_lvl+0x8b/0xb3
[ 2296.854825] should_fail.cold+0x5/0xa
[ 2296.854841] ? create_object.isra.0+0x3a/0xa20
[ 2296.854865] should_failslab+0x5/0x10
[ 2296.854885] kmem_cache_alloc+0x5b/0x480
[ 2296.854914] create_object.isra.0+0x3a/0xa20
[ 2296.854932] ? kasan_unpoison+0x23/0x50
[ 2296.854955] kmem_cache_alloc_lru+0x2d3/0x7c0
[ 2296.854978] ? __d_alloc+0x31/0x990
[ 2296.855003] __d_alloc+0x31/0x990
[ 2296.855025] d_alloc_parallel+0x10a/0x1c00
21:24:40 executing program 5:
syz_read_part_table(0xfffffdfc, 0x0, 0x0)
[ 2296.855042] ? __lock_acquire+0x164e/0x6120
[ 2296.855076] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2296.855095] ? find_held_lock+0x2c/0x110
[ 2296.855112] ? __d_lookup_rcu+0x730/0x730
[ 2296.855132] ? lockdep_init_map_type+0x21a/0x7e0
[ 2296.855153] ? lockdep_init_map_type+0x21a/0x7e0
[ 2296.855181] __lookup_slow+0x193/0x490
[ 2296.855201] ? page_put_link+0x1f0/0x1f0
[ 2296.855223] ? p9_pollwake+0x100/0x170
[ 2296.855250] ? p9_pollwake+0x100/0x170
[ 2296.855270] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[ 2296.855294] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2296.855316] ? link_path_walk.part.0+0x154/0xf80
[ 2296.855340] walk_component+0x411/0x6a0
[ 2296.855361] ? handle_dots.part.0+0x1500/0x1500
[ 2296.855381] ? path_init+0x17b0/0x17b0
[ 2296.855413] path_lookupat+0x1ba/0x850
[ 2296.855439] filename_lookup+0x1c6/0x590
[ 2296.855463] ? may_linkat+0x500/0x500
[ 2296.855491] ? find_held_lock+0x2c/0x110
[ 2296.855512] ? lock_release+0x3b2/0x750
[ 2296.855529] ? __might_fault+0xd1/0x170
[ 2296.855561] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 2296.855588] ? __virt_addr_valid+0xe9/0x350
[ 2296.855610] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2296.855632] ? is_vmalloc_addr+0x7b/0xb0
[ 2296.855651] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[ 2296.855673] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2296.855695] ? __check_object_size+0x1b5/0x890
[ 2296.855722] vfs_statx+0x148/0x390
[ 2296.855749] ? inode_sub_bytes+0x100/0x100
[ 2296.855770] ? getname_flags.part.0+0x1dd/0x4f0
[ 2296.855789] ? kmem_cache_free+0xe0/0x420
[ 2296.855821] vfs_fstatat+0x8c/0xb0
[ 2296.855847] __do_sys_newstat+0x88/0x110
[ 2296.855870] ? __ia32_sys_stat+0x70/0x70
[ 2296.855891] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2296.855913] ? xfd_validate_state+0x59/0x180
[ 2296.855938] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2296.855970] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2296.855995] ? lockdep_hardirqs_on+0x79/0x100
[ 2296.856018] do_syscall_64+0x3b/0x90
[ 2296.856035] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2296.856056] RIP: 0033:0x7f5b6be25b16
[ 2296.856069] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2296.856084] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2296.856099] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16
[ 2296.856109] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40
[ 2296.856118] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2296.856127] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000005
[ 2296.856136] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2296.856163]
[ 2296.889866] loop2: detected capacity change from 0 to 215922
[ 2296.966097] loop6: detected capacity change from 0 to 215922
[ 2296.971949] FAULT_INJECTION: forcing a failure.
[ 2296.971949] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2296.971983] CPU: 1 PID: 9808 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2296.972010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2296.972027] Call Trace:
[ 2296.972033]
[ 2296.972042] dump_stack_lvl+0x8b/0xb3
[ 2296.972083] should_fail.cold+0x5/0xa
[ 2296.972122] strncpy_from_user+0x34/0x3d0
21:24:40 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 88)
[ 2296.972155] getname_flags.part.0+0x95/0x4f0
[ 2296.972181] ? kmem_cache_free+0xe0/0x420
[ 2296.972228] getname_flags+0x9a/0xe0
[ 2296.972264] vfs_fstatat+0x73/0xb0
[ 2296.972301] __do_sys_newstat+0x88/0x110
[ 2296.972333] ? __ia32_sys_stat+0x70/0x70
[ 2296.972368] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2296.972403] ? xfd_validate_state+0x59/0x180
[ 2296.972443] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2296.972489] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2296.972531] ? lockdep_hardirqs_on+0x79/0x100
[ 2296.972573] do_syscall_64+0x3b/0x90
[ 2296.972602] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2296.972642] RIP: 0033:0x7f5b6be25b16
[ 2296.972666] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2296.972713] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2296.972751] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16
[ 2296.972774] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40
[ 2296.972789] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
21:24:40 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x4b47, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2296.972810] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000006
[ 2296.972834] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2296.972884]
[ 2296.976957] loop4: detected capacity change from 0 to 215922
[ 2297.060176] loop6: detected capacity change from 0 to 215922
[ 2297.067702] FAULT_INJECTION: forcing a failure.
[ 2297.067702] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2297.067721] CPU: 1 PID: 9811 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2297.067735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2297.067744] Call Trace:
[ 2297.067748]
[ 2297.067752] dump_stack_lvl+0x8b/0xb3
[ 2297.067773] should_fail.cold+0x5/0xa
[ 2297.067788] strncpy_from_user+0x34/0x3d0
[ 2297.067812] getname_flags.part.0+0x95/0x4f0
[ 2297.067831] ? kmem_cache_free+0xe0/0x420
[ 2297.067856] getname_flags+0x9a/0xe0
[ 2297.067875] vfs_fstatat+0x73/0xb0
[ 2297.067896] __do_sys_newstat+0x88/0x110
[ 2297.067914] ? __ia32_sys_stat+0x70/0x70
[ 2297.067931] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2297.067952] ? xfd_validate_state+0x59/0x180
[ 2297.067972] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2297.067996] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2297.068016] ? lockdep_hardirqs_on+0x79/0x100
[ 2297.068034] do_syscall_64+0x3b/0x90
[ 2297.068049] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2297.068065] RIP: 0033:0x7f5b6be25b16
[ 2297.068075] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2297.068087] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2297.068099] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16
[ 2297.068107] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40
[ 2297.068115] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2297.068123] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000006
[ 2297.068130] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2297.068151]
[ 2297.087038] loop5: detected capacity change from 0 to 264192
[ 2297.097777] loop5: detected capacity change from 0 to 264192
[ 2297.109105] loop7: detected capacity change from 0 to 215922
[ 2297.121947] FAULT_INJECTION: forcing a failure.
[ 2297.121947] name failslab, interval 1, probability 0, space 0, times 0
[ 2297.121967] CPU: 0 PID: 9817 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2297.121983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2297.121993] Call Trace:
[ 2297.121998]
[ 2297.122003] dump_stack_lvl+0x8b/0xb3
[ 2297.122026] should_fail.cold+0x5/0xa
[ 2297.122040] ? kobject_get_path+0xc0/0x1d0
[ 2297.122059] should_failslab+0x5/0x10
[ 2297.122078] __kmalloc+0x72/0x440
[ 2297.122103] kobject_get_path+0xc0/0x1d0
[ 2297.122124] kobject_uevent_env+0x25c/0xfa0
[ 2297.122143] ? kernfs_put+0x42/0x50
[ 2297.122168] __loop_clr_fd+0x2f8/0x8b0
[ 2297.122190] lo_ioctl+0x632/0x1990
[ 2297.122207] ? vfs_fstatat+0x97/0xb0
[ 2297.122231] ? loop_set_status_old+0x1b0/0x1b0
[ 2297.122248] ? avc_ss_reset+0x180/0x180
[ 2297.122281] ? __lock_acquire+0xbac/0x6120
[ 2297.122311] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2297.122332] ? lock_is_held_type+0xd7/0x130
[ 2297.122350] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2297.122373] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[ 2297.122394] ? do_vfs_ioctl+0x132/0x1610
[ 2297.122415] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2297.122437] ? blkdev_common_ioctl+0x1ad/0x1990
[ 2297.122452] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400
[ 2297.122474] ? blkdev_bszset+0x1f0/0x1f0
[ 2297.122487] ? selinux_inode_getsecctx+0x90/0x90
[ 2297.122510] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2297.122532] ? __ia32_sys_stat+0x70/0x70
[ 2297.122553] ? loop_set_status_old+0x1b0/0x1b0
[ 2297.122573] blkdev_ioctl+0x356/0x7f0
[ 2297.122586] ? blkdev_common_ioctl+0x1990/0x1990
[ 2297.122600] ? selinux_file_ioctl+0xb1/0x260
[ 2297.122620] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2297.122641] ? blkdev_common_ioctl+0x1990/0x1990
[ 2297.122657] __x64_sys_ioctl+0x196/0x210
[ 2297.122680] do_syscall_64+0x3b/0x90
[ 2297.122695] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2297.122714] RIP: 0033:0x7f1d2141e8d7
[ 2297.122724] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2297.122738] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 2297.122751] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141e8d7
[ 2297.122759] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005
[ 2297.122767] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90
[ 2297.122775] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000008
[ 2297.122783] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f1d1e993f80
[ 2297.122805]
[ 2297.128287] loop2: detected capacity change from 0 to 215922
[ 2297.158949] loop6: detected capacity change from 0 to 215922
[ 2297.165677] loop2: detected capacity change from 0 to 215922
[ 2297.166340] FAULT_INJECTION: forcing a failure.
[ 2297.166340] name failslab, interval 1, probability 0, space 0, times 0
[ 2297.166359] CPU: 1 PID: 9825 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2297.166373] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2297.166382] Call Trace:
[ 2297.166385]
[ 2297.166390] dump_stack_lvl+0x8b/0xb3
[ 2297.166411] should_fail.cold+0x5/0xa
[ 2297.166424] ? create_object.isra.0+0x3a/0xa20
[ 2297.166446] should_failslab+0x5/0x10
[ 2297.166463] kmem_cache_alloc+0x5b/0x480
[ 2297.166489] create_object.isra.0+0x3a/0xa20
[ 2297.166503] ? kasan_unpoison+0x23/0x50
[ 2297.166522] kmem_cache_alloc_lru+0x2d3/0x7c0
[ 2297.166542] ? __d_alloc+0x31/0x990
[ 2297.166570] __d_alloc+0x31/0x990
[ 2297.166587] d_alloc_parallel+0x10a/0x1c00
[ 2297.166604] ? __lock_acquire+0x164e/0x6120
[ 2297.166633] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2297.166649] ? find_held_lock+0x2c/0x110
[ 2297.166665] ? __d_lookup_rcu+0x730/0x730
[ 2297.166682] ? lockdep_init_map_type+0x21a/0x7e0
[ 2297.166700] ? lockdep_init_map_type+0x21a/0x7e0
[ 2297.166723] __lookup_slow+0x193/0x490
[ 2297.166741] ? page_put_link+0x1f0/0x1f0
[ 2297.166759] ? p9_pollwake+0x100/0x170
[ 2297.166782] ? p9_pollwake+0x100/0x170
[ 2297.166798] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[ 2297.166818] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2297.166836] ? link_path_walk.part.0+0x154/0xf80
[ 2297.166856] walk_component+0x411/0x6a0
[ 2297.166872] ? handle_dots.part.0+0x1500/0x1500
[ 2297.166888] ? path_init+0x17b0/0x17b0
[ 2297.166911] path_lookupat+0x1ba/0x850
[ 2297.166933] filename_lookup+0x1c6/0x590
[ 2297.166951] ? may_linkat+0x500/0x500
[ 2297.166974] ? find_held_lock+0x2c/0x110
[ 2297.166991] ? lock_release+0x3b2/0x750
[ 2297.167006] ? __might_fault+0xd1/0x170
[ 2297.167025] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 2297.167043] ? __virt_addr_valid+0xe9/0x350
[ 2297.167061] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2297.167079] ? is_vmalloc_addr+0x7b/0xb0
[ 2297.167095] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[ 2297.167113] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2297.167131] ? __check_object_size+0x1b5/0x890
[ 2297.167153] vfs_statx+0x148/0x390
[ 2297.167175] ? inode_sub_bytes+0x100/0x100
[ 2297.167192] ? getname_flags.part.0+0x1dd/0x4f0
[ 2297.167207] ? kmem_cache_free+0xe0/0x420
[ 2297.167233] vfs_fstatat+0x8c/0xb0
[ 2297.167254] __do_sys_newstat+0x88/0x110
[ 2297.167272] ? __ia32_sys_stat+0x70/0x70
[ 2297.167289] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2297.167307] ? xfd_validate_state+0x59/0x180
[ 2297.167327] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2297.167353] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2297.167373] ? lockdep_hardirqs_on+0x79/0x100
[ 2297.167392] do_syscall_64+0x3b/0x90
[ 2297.167406] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2297.167424] RIP: 0033:0x7f5b6be25b16
[ 2297.167434] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2297.167447] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2297.167459] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16
[ 2297.167468] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40
[ 2297.167476] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2297.167484] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000006
[ 2297.167491] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2297.167513]
[ 2297.265166] loop4: detected capacity change from 0 to 215922
[ 2297.287769] loop4: detected capacity change from 0 to 215922
21:24:56 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xffffffff00000000, 0x0)
21:24:56 executing program 5:
syz_read_part_table(0xfffffdfd, 0x0, 0x0)
21:24:56 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:24:56 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x4b49, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:24:56 executing program 7:
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 94)
21:24:56 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xb3e5960600000000, 0x0)
21:24:56 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x2288, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:24:56 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 89)
[ 2312.526059] loop5: detected capacity change from 0 to 264192
[ 2312.555071] loop7: detected capacity change from 0 to 215922
[ 2312.563731] 9pnet_fd: p9_fd_create_tcp (9840): problem connecting socket to 127.0.0.1
[ 2312.593309] loop6: detected capacity change from 0 to 215922
[ 2312.598974] loop2: detected capacity change from 0 to 215922
21:24:56 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xfffffffffffff000, 0x0)
[ 2312.624159] FAULT_INJECTION: forcing a failure.
[ 2312.624159] name failslab, interval 1, probability 0, space 0, times 0
[ 2312.624187] CPU: 1 PID: 9850 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2312.624206] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2312.624217] Call Trace:
[ 2312.624223]
[ 2312.624231] dump_stack_lvl+0x8b/0xb3
[ 2312.624259] should_fail.cold+0x5/0xa
[ 2312.624279] ? create_object.isra.0+0x3a/0xa20
[ 2312.624313] should_failslab+0x5/0x10
[ 2312.624337] kmem_cache_alloc+0x5b/0x480
21:24:56 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 90)
21:24:56 executing program 7:
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 95)
[ 2312.624374] create_object.isra.0+0x3a/0xa20
[ 2312.624513] ? kasan_unpoison+0x23/0x50
[ 2312.624539] kmem_cache_alloc_lru+0x2d3/0x7c0
[ 2312.624564] ? __d_alloc+0x31/0x990
[ 2312.624591] __d_alloc+0x31/0x990
21:24:56 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xfffffffffffffffe, 0x0)
[ 2312.624617] d_alloc_parallel+0x10a/0x1c00
[ 2312.624636] ? __lock_acquire+0x164e/0x6120
21:24:56 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xf6ffffff00000000, 0x0)
[ 2312.624677] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2312.624700] ? find_held_lock+0x2c/0x110
[ 2312.624722] ? __d_lookup_rcu+0x730/0x730
[ 2312.624744] ? lockdep_init_map_type+0x21a/0x7e0
[ 2312.624770] ? lockdep_init_map_type+0x21a/0x7e0
[ 2312.624801] __lookup_slow+0x193/0x490
[ 2312.624824] ? page_put_link+0x1f0/0x1f0
[ 2312.624850] ? p9_pollwake+0x100/0x170
[ 2312.624882] ? p9_pollwake+0x100/0x170
21:24:56 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x2289, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2312.624903] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[ 2312.624930] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2312.624956] ? link_path_walk.part.0+0x154/0xf80
[ 2312.624985] walk_component+0x411/0x6a0
[ 2312.625008] ? handle_dots.part.0+0x1500/0x1500
[ 2312.625033] ? path_init+0x17b0/0x17b0
[ 2312.625064] path_lookupat+0x1ba/0x850
[ 2312.625095] filename_lookup+0x1c6/0x590
21:24:56 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 91)
[ 2312.625122] ? may_linkat+0x500/0x500
[ 2312.625156] ? find_held_lock+0x2c/0x110
[ 2312.625178] ? lock_release+0x3b2/0x750
[ 2312.625198] ? __might_fault+0xd1/0x170
[ 2312.625224] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 2312.625252] ? __virt_addr_valid+0xe9/0x350
[ 2312.625276] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2312.625301] ? is_vmalloc_addr+0x7b/0xb0
[ 2312.625323] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[ 2312.625350] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2312.625376] ? __check_object_size+0x1b5/0x890
[ 2312.625408] vfs_statx+0x148/0x390
[ 2312.625442] ? inode_sub_bytes+0x100/0x100
[ 2312.625482] ? getname_flags.part.0+0x1dd/0x4f0
[ 2312.625505] ? kmem_cache_free+0xe0/0x420
[ 2312.625542] vfs_fstatat+0x8c/0xb0
[ 2312.625574] __do_sys_newstat+0x88/0x110
21:24:56 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x5382, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2312.625602] ? __ia32_sys_stat+0x70/0x70
[ 2312.625628] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2312.625654] ? xfd_validate_state+0x59/0x180
[ 2312.625681] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2312.625720] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2312.625750] ? lockdep_hardirqs_on+0x79/0x100
[ 2312.625778] do_syscall_64+0x3b/0x90
[ 2312.625799] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2312.625823] RIP: 0033:0x7f5b6be25b16
[ 2312.625836] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2312.625849] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2312.625865] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16
[ 2312.625875] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40
[ 2312.625886] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2312.625897] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000007
[ 2312.625907] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2312.625940]
[ 2312.637861] FAULT_INJECTION: forcing a failure.
[ 2312.637861] name failslab, interval 1, probability 0, space 0, times 0
[ 2312.637891] CPU: 1 PID: 9846 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2312.637910] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2312.637922] Call Trace:
[ 2312.637928]
21:24:56 executing program 5:
syz_read_part_table(0xffffff97, 0x0, 0x0)
[ 2312.637935] dump_stack_lvl+0x8b/0xb3
[ 2312.637961] should_fail.cold+0x5/0xa
[ 2312.637981] ? create_object.isra.0+0x3a/0xa20
[ 2312.638009] should_failslab+0x5/0x10
[ 2312.638034] kmem_cache_alloc+0x5b/0x480
[ 2312.638068] create_object.isra.0+0x3a/0xa20
[ 2312.638092] ? kasan_unpoison+0x23/0x50
[ 2312.638119] __kmalloc+0x25b/0x440
[ 2312.638154] kobject_get_path+0xc0/0x1d0
[ 2312.638181] kobject_uevent_env+0x25c/0xfa0
[ 2312.638210] ? kernfs_put+0x42/0x50
[ 2312.638245] __loop_clr_fd+0x2f8/0x8b0
[ 2312.638274] lo_ioctl+0x632/0x1990
[ 2312.638299] ? vfs_fstatat+0x97/0xb0
[ 2312.638331] ? loop_set_status_old+0x1b0/0x1b0
[ 2312.638354] ? avc_ss_reset+0x180/0x180
[ 2312.638398] ? __lock_acquire+0xbac/0x6120
[ 2312.638445] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2312.638475] ? lock_is_held_type+0xd7/0x130
[ 2312.638500] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2312.638531] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[ 2312.638560] ? do_vfs_ioctl+0x132/0x1610
[ 2312.638590] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2312.638622] ? blkdev_common_ioctl+0x1ad/0x1990
[ 2312.638641] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400
[ 2312.638671] ? blkdev_bszset+0x1f0/0x1f0
[ 2312.638690] ? selinux_inode_getsecctx+0x90/0x90
[ 2312.638720] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2312.638752] ? __ia32_sys_stat+0x70/0x70
[ 2312.638783] ? loop_set_status_old+0x1b0/0x1b0
[ 2312.638812] blkdev_ioctl+0x356/0x7f0
[ 2312.638831] ? blkdev_common_ioctl+0x1990/0x1990
[ 2312.638850] ? selinux_file_ioctl+0xb1/0x260
[ 2312.638879] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2312.638909] ? blkdev_common_ioctl+0x1990/0x1990
[ 2312.638936] __x64_sys_ioctl+0x196/0x210
[ 2312.638969] do_syscall_64+0x3b/0x90
[ 2312.638991] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2312.639017] RIP: 0033:0x7f1d2141e8d7
[ 2312.639031] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2312.639048] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 2312.639065] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141e8d7
[ 2312.639078] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005
[ 2312.639089] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90
[ 2312.639101] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000008
[ 2312.639112] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f1d1e993f80
[ 2312.639145]
[ 2312.666972] loop4: detected capacity change from 0 to 215922
[ 2312.692806] loop2: detected capacity change from 0 to 215922
[ 2312.733829] loop5: detected capacity change from 0 to 264192
[ 2312.784917] loop6: detected capacity change from 0 to 215922
[ 2312.791088] FAULT_INJECTION: forcing a failure.
[ 2312.791088] name failslab, interval 1, probability 0, space 0, times 0
[ 2312.791113] CPU: 1 PID: 9861 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2312.791132] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2312.791143] Call Trace:
[ 2312.791148]
[ 2312.791154] dump_stack_lvl+0x8b/0xb3
[ 2312.791178] should_fail.cold+0x5/0xa
[ 2312.791197] ? create_object.isra.0+0x3a/0xa20
[ 2312.791223] should_failslab+0x5/0x10
[ 2312.791245] kmem_cache_alloc+0x5b/0x480
[ 2312.791276] create_object.isra.0+0x3a/0xa20
[ 2312.791297] ? kasan_unpoison+0x23/0x50
[ 2312.791322] kmem_cache_alloc+0x239/0x480
[ 2312.791353] getname_flags.part.0+0x50/0x4f0
[ 2312.791375] ? kmem_cache_free+0xe0/0x420
[ 2312.791403] getname_flags+0x9a/0xe0
[ 2312.791427] vfs_fstatat+0x73/0xb0
[ 2312.791456] __do_sys_newstat+0x88/0x110
[ 2312.791482] ? __ia32_sys_stat+0x70/0x70
[ 2312.791507] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2312.791532] ? clockevents_program_event+0x131/0x350
[ 2312.791554] ? tick_program_event+0xb4/0x140
[ 2312.791583] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2312.791611] ? hrtimer_interrupt+0x5b0/0x770
[ 2312.791648] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2312.791677] ? lockdep_hardirqs_on+0x79/0x100
[ 2312.791702] do_syscall_64+0x3b/0x90
[ 2312.791722] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2312.791744] RIP: 0033:0x7f5b6be25b16
[ 2312.791757] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2312.791771] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2312.791787] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16
[ 2312.791798] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40
[ 2312.791808] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2312.791818] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000007
[ 2312.791828] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2312.791855]
[ 2312.938004] loop6: detected capacity change from 0 to 215922
[ 2312.945857] FAULT_INJECTION: forcing a failure.
[ 2312.945857] name failslab, interval 1, probability 0, space 0, times 0
[ 2312.945885] CPU: 0 PID: 9865 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2312.945904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2312.945915] Call Trace:
[ 2312.945925]
[ 2312.945932] dump_stack_lvl+0x8b/0xb3
[ 2312.945955] should_fail.cold+0x5/0xa
[ 2312.945971] ? create_object.isra.0+0x3a/0xa20
[ 2312.945997] should_failslab+0x5/0x10
[ 2312.946019] kmem_cache_alloc+0x5b/0x480
[ 2312.946052] create_object.isra.0+0x3a/0xa20
[ 2312.946073] ? kasan_unpoison+0x23/0x50
[ 2312.946097] kmem_cache_alloc+0x239/0x480
[ 2312.946128] getname_flags.part.0+0x50/0x4f0
[ 2312.946150] ? kmem_cache_free+0xe0/0x420
[ 2312.946180] getname_flags+0x9a/0xe0
[ 2312.946208] vfs_fstatat+0x73/0xb0
[ 2312.946238] __do_sys_newstat+0x88/0x110
[ 2312.946264] ? __ia32_sys_stat+0x70/0x70
[ 2312.946289] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2312.946315] ? xfd_validate_state+0x59/0x180
[ 2312.946344] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2312.946381] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2312.946408] ? lockdep_hardirqs_on+0x79/0x100
[ 2312.946436] do_syscall_64+0x3b/0x90
[ 2312.946457] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2312.946481] RIP: 0033:0x7f5b6be25b16
[ 2312.946495] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2312.946512] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2312.946530] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be25b16
[ 2312.946542] RDX: 00007f5b6939bfc0 RSI: 00007f5b6939bfc0 RDI: 00007f5b6939bf40
[ 2312.946553] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2312.946563] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000007
[ 2312.946574] R13: 00007f5b6939bfc0 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2312.946605]
[ 2312.997757] loop4: detected capacity change from 0 to 215922
[ 2312.998055] loop2: detected capacity change from 0 to 215922
[ 2313.020378] loop7: detected capacity change from 0 to 215922
[ 2313.020800] loop5: detected capacity change from 0 to 264192
[ 2313.028355] FAULT_INJECTION: forcing a failure.
[ 2313.028355] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2313.028382] CPU: 0 PID: 9877 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2313.028406] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2313.028417] Call Trace:
[ 2313.028422]
[ 2313.028430] dump_stack_lvl+0x8b/0xb3
[ 2313.028456] should_fail.cold+0x5/0xa
[ 2313.028479] strncpy_from_user+0x34/0x3d0
[ 2313.028511] getname_flags.part.0+0x95/0x4f0
[ 2313.028535] ? kmem_cache_free+0xe0/0x420
[ 2313.028575] getname_flags+0x9a/0xe0
[ 2313.028602] vfs_fstatat+0x73/0xb0
[ 2313.028633] __do_sys_newstat+0x88/0x110
[ 2313.028661] ? __ia32_sys_stat+0x70/0x70
[ 2313.028687] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2313.028715] ? xfd_validate_state+0x59/0x180
[ 2313.028744] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2313.028783] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2313.028814] ? lockdep_hardirqs_on+0x79/0x100
[ 2313.028844] do_syscall_64+0x3b/0x90
[ 2313.028866] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2313.028891] RIP: 0033:0x7f1d2141db16
[ 2313.028905] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2313.028923] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2313.028942] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141db16
[ 2313.028956] RDX: 00007f1d1e993fc0 RSI: 00007f1d1e993fc0 RDI: 00007f1d1e993f40
[ 2313.028968] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90
[ 2313.028980] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000007
[ 2313.028990] R13: 00007f1d1e993fc0 R14: 0000000000000000 R15: 00007f1d1e993f80
[ 2313.029023]
[ 2313.033442] loop5: detected capacity change from 0 to 264192
[ 2313.034675] loop2: detected capacity change from 0 to 215922
21:25:14 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xffffffffffffffff, 0x0)
21:25:14 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:25:14 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x4b47, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:25:14 executing program 7:
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 96)
21:25:14 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 92)
21:25:14 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xfcfdffff00000000, 0x0)
21:25:14 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x5385, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:25:14 executing program 5:
syz_read_part_table(0xfffffff6, 0x0, 0x0)
[ 2330.440068] loop5: detected capacity change from 0 to 264192
[ 2330.451193] 9pnet_fd: p9_fd_create_tcp (9891): problem connecting socket to 127.0.0.1
[ 2330.459473] loop4: detected capacity change from 0 to 215922
[ 2330.471395] loop2: detected capacity change from 0 to 215922
[ 2330.491016] loop7: detected capacity change from 0 to 215922
[ 2330.494755] loop5: detected capacity change from 0 to 264192
[ 2330.509138] FAULT_INJECTION: forcing a failure.
[ 2330.509138] name failslab, interval 1, probability 0, space 0, times 0
[ 2330.509159] CPU: 0 PID: 9904 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2330.509172] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2330.509181] Call Trace:
[ 2330.509185]
[ 2330.509190] dump_stack_lvl+0x8b/0xb3
[ 2330.509211] should_fail.cold+0x5/0xa
[ 2330.509224] ? create_object.isra.0+0x3a/0xa20
[ 2330.509245] should_failslab+0x5/0x10
[ 2330.509262] kmem_cache_alloc+0x5b/0x480
[ 2330.509285] create_object.isra.0+0x3a/0xa20
[ 2330.509300] ? kasan_unpoison+0x23/0x50
[ 2330.509317] __kmalloc+0x25b/0x440
[ 2330.509340] kobject_get_path+0xc0/0x1d0
[ 2330.509359] kobject_uevent_env+0x25c/0xfa0
[ 2330.509376] ? kernfs_put+0x42/0x50
[ 2330.509398] __loop_clr_fd+0x2f8/0x8b0
[ 2330.509418] lo_ioctl+0x632/0x1990
[ 2330.509434] ? vfs_fstatat+0x97/0xb0
[ 2330.509455] ? loop_set_status_old+0x1b0/0x1b0
[ 2330.509470] ? avc_ss_reset+0x180/0x180
[ 2330.509500] ? __lock_acquire+0xbac/0x6120
[ 2330.509526] ? lockdep_hardirqs_on_prepare+0x400/0x400
21:25:14 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xfeffffff00000000, 0x0)
21:25:14 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)={0xfffffff9, 0xe385, 0x200, 0x9, 0x80000, 0x7f})
stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0})
setresuid(0x0, r3, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000007500)=0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r6]}}], 0x18}, 0x0)
r7 = inotify_init()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007780)={0x0}, &(0x7f00000077c0)=0xc)
lstat(&(0x7f0000007800)='./file0\x00', &(0x7f0000007840)={0x0, 0x0, 0x0, 0x0, 0x0})
[ 2330.509545] ? lock_is_held_type+0xd7/0x130
[ 2330.509565] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2330.509585] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[ 2330.509604] ? do_vfs_ioctl+0x132/0x1610
[ 2330.509623] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2330.509643] ? blkdev_common_ioctl+0x1ad/0x1990
[ 2330.509655] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400
[ 2330.509674] ? blkdev_bszset+0x1f0/0x1f0
[ 2330.509686] ? selinux_inode_getsecctx+0x90/0x90
[ 2330.509706] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2330.509735] ? __ia32_sys_stat+0x70/0x70
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007940)={&(0x7f00000003c0), 0xc, &(0x7f00000076c0)=[{&(0x7f0000002900)={0x2e4, 0x22, 0x100, 0x70bd2d, 0x25dfdbfd, "", [@nested={0x24b, 0x8c, 0x0, 0x1, [@typed={0x8, 0x35, 0x0, 0x0, @uid}, @typed={0x8, 0x70, 0x0, 0x0, @ipv4=@loopback}, @generic="3391a18038f95f424b832912ceb4b73dde7a2ef16d72857379dbf3fb0e6fd08508c4c251c7008534a50e858d530c5c46bbdcc2943981fa2967b1b4bb5f8713618f48e9afed6687ae3a72b6e5a98337ebb851cedbf5173b6aa2afd2c564e823bb35edde7d5f8132089311537110f87c255e55d9eedfd081f83fb8842ba712547c44ff710f7802e6d7d10377249a39577c330964c3b4cc473f7d7ae30c0853c6766c", @generic="4e3aa8b456cb0d6c8d02fcb76b0b7282228b2055387573b35954b17d7d11101dd092fe62dfaced9fcce0d55ce94363ab8b0e74791446abb5c652f6135066415bf78a5687da80117a8fa81381faa80449c411f7ba5b679ec433830acd3a0b4525aeefdbeda06ee1d85f2d5b4855a29ee8abe4566d700852edfe309d6564840633203be9849318f9b27904d5b60f3a7c763b7591db4eff28ad6183129d078a46fd5b168c70e5a4eff90523dbad02ed2fcdacbf12fc7a1f8ce0b5027e593a6c668d65e8f390e1b318ea86", @generic="8e677d1d5bd4e6feebfe443f2a553e608ac9a2b9c12c058ca71b2ab53f9a678d4e3a1ca65c1cba04bdafcc612739ffa0764790b4e552726f50e0676ac015cfbd4f354ca7ad1a4cfc1d96d770c6daf338defa091428aae9b51a3495a4ebd71b8c65e9189203c2cb2ecb867b3772ca2a0e0682fd4f614739bf9ab4e5f4b7cf514236b89184943f4ee9f9040f3ca1c70b5601b07f2a80ef766dab95e32cf99fdcd330f4b58450646f9e62535da4f62a6e87e4592ac29666142db5c001baabaab57ce27c25e42920fbb8617fe8bbd4"]}, @generic="35bfe07b67960c1672b791197682a4012b93272f1e649243efcb86c50e3f", @generic="c60c015e7fa3325a956d405dd4695dd300ea5b6d6cd5af265a56ecaf9151b9441de1088b0d708b974b869bfa3d4d5edb3bbc556d3e5bd6893c53fbf6d637ea0a0ce4cbf577749476e55e25b8f1452385cc21bc141f22a6cc53e4d105ab2db2ac28e022df0d7008e8"]}, 0x2e4}, {&(0x7f0000002c40)={0x1230, 0x27, 0x200, 0x70bd27, 0x25dfdbfe, "", [@typed={0x8, 0x16, 0x0, 0x0, @u32=0x2b4a}, @typed={0x14, 0x5d, 0x0, 0x0, @ipv6=@mcast2}, @nested={0x48, 0x94, 0x0, 0x1, [@generic="afe31f493d80aa1d59e5411186174fc64f4a50f22984cb8758ca4705b5d10adf29736175c70ca1bd06e323d71d6f7fa7d53973fa7864e7ecfb2eeeb3e346b79bd6cf35d0"]}, @typed={0x4a, 0x5, 0x0, 0x0, @binary="6ba31c27cf1ab1de8c1a4d1c797267d291308a33d3a5e2da9c7e0fea6eef866587292b2f0dfbe90dc8f4b9afbd578a351eed1b5d24a384834ab9f2c72c3b112d55dbad1801fd"}, @nested={0x162, 0x4e, 0x0, 0x1, [@generic, @generic="886ebfb19ec8370d2c32fbb1606c284b0e800edf0edd51b0323ea7a48a1b2f71aa15ea364a4398549fd71ecca19aa97d56ad4fee574dfea4d24f7069bca5a81f2b048e18d697a1e98103173c95f347e62ffa0b39113a8d76387732d65c716b895b4c9f565fe378c334149b378243fdd31548e27d91d5c68765f3afda8ddbc79667fd0aca7ade59562d965de3f4be74a86c5cbd69a0da49b09b3f6f3eeeacae1933d2bd25466cb361c9ead2948f47374b1a148a0d7623eaeb61ce8aafb374dba02280624a2f33688c3cda40b0b52108bec59e0a", @generic="6e215b942cb6f765084387d535165463a1a7d57e34d4a64786aedde021e691cd551c2062722640a1536ecaa2cb7e60e9475deab8b9c18bc8822bd372c92c1d73785d68831eaa43b1256c69f0889aec7f69e9fbb9daa2e1d7790bac666b5774a6192191f2d315a2d984b38a3a784566", @typed={0x8, 0x88, 0x0, 0x0, @u32=0x3}, @typed={0x8, 0x80, 0x0, 0x0, @ipv4=@loopback}, @typed={0x4, 0x4a}, @typed={0x8, 0x8a, 0x0, 0x0, @u32=0x8}]}, @typed={0x8, 0x32, 0x0, 0x0, @pid}, @typed={0x1004, 0x59, 0x0, 0x0, @binary="4ce6ef3abee5a062df50cfd4166c0865b5f0e174072c79d059bd6369dad958c71514702d55e37afa7991722d608bbe91a92f98dd984693d9f8252d4546e0dc4369e685438027e5e518eb8a3f700ce68933eb9d96dd87566d1236c94df5f173d738f83848318dd81e2d6dbbe71c3ee5327a77e81e8b5fa46564003bbde1b9b283fba1899790199451791a2618aee024229d560459dd7d27652233fd7493a769a2fbf5cfa9f3d1f9a8dd1b7daa1abe5969202ceeede8d44db3d4509cabfe5f6b6e076aa038183589100eb4741def2bc7983276b4882002a09485046b583b390b5c53e18d993f0a966dd6923cb8ee3acdad78532c6998f6b19b164d7e41295a58a6e1214bb6e8710e271a704e73e2629cac1e855e22101b570ceb3a9d6f2b764f8129e9047dab896f77a46f0645e76baf1e4e7b071f08e2be4291e08e7cf8db6a17e7d6c5f6c18c0507826482ebafe7bb25f40526f4826fd493ff4cbd4764b77899ebfdd5702b6dcf8eb92d4a535a6c145dc39ac6c3f7e402b4bf50ee1d314c714dbfb65229ce4080ac242a9e4560b12921a45735b54e877f9c9401f05c2e0243c6ca73d5392d83c5ad1400141f5a2474bfbe1c5842d033734c17a8bd49287ba7a0c70be4a7af749dd0dfa8c366d81cd3e3cc6feebee25be6af7c77a5fcb8dcaa30812e2f8f2a01da1a9f326ad7b0afe0257ee4d461aee2e31b2160ccb5fd5406af220184a192f4f779c9029a3ee4605496141e8720d3d034b41b29816b5d29e5df22fe01d5a6752fb161593f8d37ef759237a35d6d7a6fe2ac060d6ee9c5963f30fa47a9412bfadae0bc44f1123efdd40a5f8582a111a0c0465be90ed34cce8e070ce33fe4da23d1b3e4ce20d4b36d1c2e89cc71dd9ca53e284b1c97252db2332a7133c81ca672df7b45317e4fa9f0dd1a7d5894ea6f621a79d25270e5253df59207299ab6dd346d97871e406168158b77b1680ab2c184f1d7e3dd4d0910cdfcadb8f76589cfa852a1bad28fda870dae2118b029700753da02d01a66a5208b9fce8455077ed876ad60c9a38f53ddddfe488786870c0c5166fc4d9da6fe7e1951db1b4d8dc732a78bc0369e0be77357be27dc11ef6d76e0a7ccca66ad999e4fcf5c00b456a0565de042698f47709625c11856d78621d74709b4b6ccb27bc7424bc873c43c9c7710dcb93e43c55c249344b78327b14238dc95f12e3a861a6c96a4b52caa3c6b1220c7dab6aa5df136e87bac8d6a0550ff312fbdee823e4c4a03ee45188e4a1c660c1ce29752627e91dcd182a57952d0fe65b4715cd4ae772a1407c4f1424e557675699cdd543d1fcce063e9982d1d1d25b1c86ce44466a518e1ae777587d835209012ab042e31a876252bbf477fbb5c6ed15d11f2a9f0c126f95b6dd86ad9f8b18700ff2c6f5fc65649ac4425ba0a560657124261baffbe5520a3c9bb5cbfb58fd2ff7bfd62bd0122f2d810f773905efba6f4a268f4e733631af88532c1b99fe113b186748ecd86b571339bccee7239fc3d0c5dba0e8bff4d415643468566b123b161a9e621a3622aa768caac4825eb7f5a2cfd1a0bf8c3b12a4367b908c844362f565ff4c8786a7bc12cb8d4b4cb0f3b47d5e2043715ba1a1bc89eaa8e3facc52ee391172d0f753bc09526e975fbc48b49b823f0063c2815d00ccbca4fbb7dcbd94670b54de6ec74fe1f674a74e460f637bbc586ec278aee5ae86fcdd812f740f765ac3b04191912350f3844e66475db5eb95ec89c545f5aaa509df3109b61cf4d4da34270f89ab10314d8c66c55495acb00d2519d5585044cdcb46dc070e88a74ef9a60a11b67d3e1985431c60f803981aae2584a6ccdce1f9f91075cfd5f064d47af75f8ce6f41113c11365c31c0f2bc1581a1da33ed115540b8f0d46d4bafa99dd600496269dc4b8addc9ce9173028aaeaf478d1f217b7c8283183a0f58920a1b629b25f36b1b6f511f78a9753e25ddfc21c6a16117ba4a1e2d6c2b54216c1c8a3e724ba8ace0dc341e7631af17f3cfe3995ec9a9d7b7878809ea261272d56702f766b66360bc5a8890f37c91f35a61cb74aa3c68538218b44b1187dff781be117170e3dd5e726a0675dad22811296fb5532f7951641c017b28c78e03ca81f74151b12a1ae53b2b2cf61645e09ac783bea977f1e823afb9c8051b15c2ccbec468de268fbc2166683574e18add969a52e0d3dfc647334982580ddb09fb2f104c2caf118af2e2f3fadfe710c2b96b31645f395866baf4689c7f157b0f54e247f3bb42f100a18a37bd996573fb2a73a2c2ebff900008b8897f144639888421450205ab11048e4214548d7af7a8980aff87ad84568358568613f584e131485752d66470af93281788eee6ea1bdf64505f7979444dfe4bf5ee36207aa3dce2d3c95479caba012bd47e20513551101192cd01641d035f79148bffc14298bcc0c722b1c0bf3d23a6e315afd189ffdd961b3e56a115a9869ef77a3b09b1041a7fee3f0c01cc813fef8c24b227649ec3538f143a1b3157ed5330b548f7f745d1c3ab740df374f75edd5d22ce211379ff75b8037a8aefca4e19ab7b4fd8024cf3821d8dffff1cd8f8e05a6858bb9cf4407ed68dcaaaf44b65e94d8c4397d2f7ab2488b87f07a1aa51006cf87c754582d159afae48c50ce04686a6d613710726e4e4b4e8925c4ca1ab67dc9a22d4450c4809bea3efe45ef67dd25d61b4e695d7f4089f584636227d24f39a67c3242be012f13b136858054be281396dc8a6d6be882b14fafc4f798eb06727417813e9493550e55d7703c057d923a75001a4696f6169a49de8640042f6ca9484dc1f3aeb0dfbe5a51fd286619e3a602e33dc3eb454ff0337c995136151327ed4ae597fe3b43172be23a55f962a16a714acbb128bb03628f7163282e7bb4e0f8a3ed8ea73d6c41e0c3f829eb060b16076d719339a59f6f77715ecfad3a7ac8c1582c5b2d57505ab8d42522e96295dfd5ce381832bf80a00cece1b5c1f654a2579b939ad18d846ec0c77297f929274af26c082905a449d18731626ec9b9d68ec0e0c885391037a7e07c8653b13e8dfb05ff330b04f08781a0acf9ef6e8e85fc557419bf65891603903b7808e8937195b36e7d8a03a34f4392eceab4906ed6cb8f6062e19d2e9fccdd6e5fbdf799768f1a756be4c72cd5795e7622215c4e51b38fcde7c9b12086b682b4a6dbb849b4c51a87960006c34644dbc0a90821a89b6c34e141ef81e19a45e7db00ee311ac4721b4f429fd5cc687fac737ed5f61c2fe94c765e20d239d43032a5c3335e161d0d90e4c8070a7339ee7d0cdfebfc15744c70f476019103175354e182a9580719f27c71e34c9cc546345b78e0fd46d85b681af84481f467e871f3bea0073497296006d70b07f7fdb83bafa00ec21dd70ef977e47d4fc8fd0fda192fd05f13ab548e33be60fd5471421087d06e53e34f44247091a9025f0cedf05e4b5c3e95cd236ec09ef1493a27c1a18b80b592bdf89a411d8ab2d5a7194e4a281f4db8b908c9343cc680d54fdb69ee46033329c8be17302137b9cca957b8bfa84ccc1189296427dece27353901aa8c4af616deae07735b414cca441125e6f77b51410db659bc2238cf5ebdd80492d9f5bcc2a9d9378d48899c8de7233acace572cbf74439856a4f966bcf526e8d41e0ec8f5c762cacf554b62d866c7ea2194306a3545f5efcb872faec85156d0f35adffe32b8ce7b3f074d5219e187efec722685deea6fe832cca2e6b96d4d07ca77e356d6ce72e9781203f465b235544fa90f97c9e9d818fd0666e987a6e5686c874b67ef8d999e7415e660198e54b4cbfae4bd0357c6791f19f2b8b9dbb1dfbceaed4ff11e34fa7f7afa5439d2c6be8692690e28becbd5439cad25b3b889f0fac57b9a8e07628f879a24f55bc9f587835a5adc56e45856a92d2f6442bebd30e9696c923c3aa01f15c99be88d9cbe5f053ac7c30eff621f9d36c9ced6ddf7607979e46615e17c9d254b92aba0fbec67d17048457aca434fc697bdf581451408a41934894e0bc2954bd672d1207e25adaf56c2a594ae11179fe9ecd172df2a1e3efd54d96256ee814bf078718e4a32e126db25e0dc63c382ed4a569ff1efade05f88e5955bc4f68fc18f4301079ba71137fd2db69a34e48fe71906dc0b60257f32bca5df83b60f5c556e0adcfb18aa0cbbc168ce114794a390f087d9bca6539ae91773d5aa4a3021d12a12374abe33aa51a0a98d4735b55e5a8652056c21c08efa363267d03685cadebb712a757cb599db03e55bf9a1b2c70dcb5885f2b04b47980b2ac9303a239c8b29cec86691cbab2147a4c8d0c1f7c38de6588d31c7b48ff090cb7d55bcf80c60bac17c948df735aaa199221eceea35d152122370f0d7564627737b6f43885a7ff7cf67b23aacccc84c66009ad72536cd2a949a06698fc039ea5ce98432a58472e136a72584050105ba5e95e728a0aab384bfc73f565ed5cb1c87f88aa5ab40cb76e6d477151a68aeb6a59519af5d4d34cae600063e747b2f36c6137e0cffa3e5227bdf32c35a47037326db257995cad3851cc33e41f9ad578bbf9b86dfb2c3bade4291bb3486301d1fad42c01a2272ee7410db9487b60e224507805bca1f2d606e7ab7c7a176002809cdfc51b84f82d13594f8c15ad52211166bd4e9833026dcf43b6214476507428cb83e20f6b332b67dd278a4186178860e87a5d705bc674e784a825ff8764b1269aee42c21823b990de075351e8ee1fb164c2729815e71dff6577ded76785aa0a103da6fc79a21779f5c02267f6b963634ee924b3af64af069132236c4b8850af1ad5bd8e65242cb3ca00d851ce48e8afa10647753b5c5f6462060c31bbe3046136202c2cde561d8896c78298b2dbe81e33ff3a0ec44a913a79c167e2bdc13d1f1ec5ab19f249f8dc203febe6ce18944684c9922140ae1cb4c069b1d613320787d6c8c0f4a62a01e016e34815924e5c8f2a50917b6a9f3f2317528674b98fe0b4ffba1c5305a0646673a7627fd10b8ccdde941a25104a4f0dc1290117b5780e379e48d1c7e36d11754cde80867e25e2eb66262785118846cc8a52d26e7c2b3193f8bdedb8c6416fd908db6a42087707144d18f2ab1ec60f71a2855e1faa859f5e07235c8dc485c3d287c4a2e28be0065db7a34148364255b3667b2a3e21a9cdddafdcf5432fe743148f644e9eb44b925c67f0308d0e2b2fd8cb9449b7c528f20241c3f33619987281879a1519a620457b98ed1464b185569a7f11ea2d657f60ae7f3cadac61301c3b841a2700dec160e2edb609d67139770b4792972b37df73392fe33b1d2bebe668b1335f17c370e4d0075f721ba9b3e16f4e5e559abc1c39c7e97cea874f3debee8317b56dbb6c834c16369aeb4e43f38b2467d497244242be3a90ecb482be83a0daf40d20b18bf1c93157b5cdf31e1af69f6792c9ea7ff6ddc09227caac407087d9449a4ece5e50820bfe798fab9c485685845582a20af7a4f4123376a44cda69c12f9a0c71cc97061c55bc909031550788a9081933ff09d2e099b3ac7c61a933dbf1bdb156aa09b5580c4c510aa4cfc7bdb463d50265712d4baab249b1c8bc0ddf1ee531a5e5da56c4b45b081d3697d7f865717d9f512b55b93ee98e07c9ff4b5ba278e1e6c8e2ae97a3ef5c111036ad6da78673892e707bb8ab456ffa9eed410c1fe466731f8e14407758777a8b50486fbd651bfac8d11af0338b5172c73b7736d0f70876a53b6cc6238aafd1e17765afebf9732ff88ba212c1508c34462013ca0f4ea2af"}]}, 0x1230}, {&(0x7f0000003e80)={0x58, 0x29, 0x400, 0x70bd2b, 0x25dfdbfd, "", [@generic="0e212d520d916aec6388d960b854ddaf134f3c27517e2f0f03bbfde703278d2fd7d5380e3844c1f35a9b92c34650857f04354eee1c9ffea2a7a1e5092f873e16eb6ff8081fc5"]}, 0x58}, {&(0x7f0000003f00)={0x20d4, 0x24, 0x200, 0x70bd2a, 0x25dfdbfc, "", [@typed={0x4, 0x1}, @typed={0x8, 0x7, 0x0, 0x0, @ipv4=@multicast1}, @nested={0x1096, 0x8, 0x0, 0x1, [@generic="b3a6918a8de71f445425c512bb453abe1b8bd76ce838549a2976b8d555d6a98f6621d0d834ae7110ec0cd7e385d70b3b40436a0805973dd7c862ba8821fd5c87d653baa973d0ebe0ee1cfb80d7ebd83490db79581c97c1c6ac5268a5623b858123f2b8aac3ebdd194808247769a38f9137891a27050df50fd8644d9030823a41510df89d18d95dcf56db", @typed={0x8, 0xf, 0x0, 0x0, @uid=0xee00}, @generic="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"]}, @nested={0x101e, 0x86, 0x0, 0x1, [@typed={0x8, 0x1e, 0x0, 0x0, @uid=0xee01}, @generic="e501538962dd", @generic="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", @typed={0x9, 0x3f, 0x0, 0x0, @str=',@\xe3Y\x00'}]}]}, 0x20d4}, {&(0x7f0000006000)={0x1048, 0x15, 0x10, 0x70bd28, 0x25dfdbfb, "", [@typed={0x4, 0x48}, @nested={0x101c, 0x77, 0x0, 0x1, [@typed={0x5, 0x5b, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x35, 0x0, 0x0, @pid}, @typed={0x8, 0x5a, 0x0, 0x0, @uid=r3}, @generic="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"]}, @nested={0x18, 0x34, 0x0, 0x1, [@generic="ec2ed90cdbd186ec116c9f44edf4b487d6bb7c65"]}]}, 0x1048}, {&(0x7f0000007080)={0x114, 0x2c, 0x2, 0x70bd27, 0x25dfdbfe, "", [@nested={0x4, 0x74}, @nested={0xfd, 0x87, 0x0, 0x1, [@typed={0xe, 0x42, 0x0, 0x0, @binary="82d00cc3364b637774f1"}, @typed={0x8, 0x16, 0x0, 0x0, @fd=r1}, @generic="b59c977e11652b6706e586b98e555223586ed7dfc982dfb555a3017ae2f1ee1f5495c1d6d5865f8f7f93b03140e66e9bd8d8f5e79eeb91e17c61140e8c437e2c36ac5e39f46fcb893980188285eb69ccb2ae46cf093614930d863cfff9285f3f75b27aea146fe7036e360791cc61c0396bac677e146aaee536ca583c54aac19a4e4373fc4ba91780b1d04e5b5b7d7663c60c027001b99f0d27e9cdc1", @generic="101e685bda358110f77228a015eda5c540844677402b6d7a0544412a", @generic="e37cf3850227039e0c7ec661e1447c2c0ad6a8d36ac1c010a1f1f4085c9904ea2253dbb576a1c75d82"]}]}, 0x114}, {&(0x7f00000071c0)={0x22c, 0x30, 0x800, 0x70bd26, 0x25dfdbff, "", [@generic="0070d5a29163a1852e22a01af6a23abbc6906db4a2837e9bd8be5944565f36d96177b5a928a320cd05988881d6a3c4b81fae792d7b85d11d84680438edde49370fb0f7f0ec63b598815fb0333ce3c1e13b582b63ca74432c175966a031242281938532120ed5fa0afd90014f69961be1596b1373c8f0654decd81459bfc397209a33fcace5bf24423dcfec6bb91b9a7bf6d2a30b20282d0dc2064a64091242668523408016f3e1ae63685ebfdd8ce81bd5cf02422976c390af302261239a0013b346c6a1f6e224b78ac5bb8aee372d17392daddfd273c06c1628c4d361851d48c7de", @nested={0x3b, 0x40, 0x0, 0x1, [@typed={0x9, 0x19, 0x0, 0x0, @binary="def5f26ea9"}, @typed={0x14, 0x2e, 0x0, 0x0, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}}, @generic="65420d876c0d30731143159bae3510", @typed={0x8, 0x27, 0x0, 0x0, @ipv4=@multicast2}]}, @generic="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"]}, 0x22c}, {&(0x7f0000007400)={0xe0, 0x29, 0x10, 0x70bd26, 0x25dfdbfe, "", [@typed={0xc, 0x45, 0x0, 0x0, @u64=0x4000000000000000}, @generic="411e07503e2bcb083b651b7a0c007c272bce2ac79db16819def624a7d2e70a41f583711ddb5c6b3db6a76f040be1d45b0a4c960edc7b78633c9509aeb3d87992c369cafd921091aa76cb7c0dc7a5c1c0f6708b2d9bdb861e9ad56311c777209009d15f53dee1af10b7d51cc29c7188ba21c5d409ad1d3f4d0e0088f5b8895b38bbb19d1ae2a5c8701a3fffff94cbc711640509472f9f4067dd3ca181d53f86d29d4a1d25", @typed={0x1d, 0x6c, 0x0, 0x0, @binary="dc92fafebef0a9e7bf3498589cc49eceebfdad663bbbf83ab7"}]}, 0xe0}, {&(0x7f0000007540)={0x15c, 0x38, 0x800, 0x70bd28, 0x25dfdbfb, "", [@nested={0x9d, 0x46, 0x0, 0x1, [@typed={0x14, 0x76, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x11}}, @generic="772ef8a4d33bcd5439f87681fc9d76e757c7daaba1026519d3be57897c2ebe0e7a98afeed4f2e36d207bd2bafc67220897d078d5da28401a5458a6feea66f516960c1d0a4107a067b9fe1b13392767479e40", @generic="38a69f7def2b6d8f40287d558f3757165f69a172a9efe7ff8ae8ed7a08ce2260269873fbd225151feafa8f", @typed={0x8, 0x5b, 0x0, 0x0, @uid=0xee00}]}, @nested={0xac, 0xe, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r4}, @typed={0xc, 0x11, 0x0, 0x0, @u64=0x9}, @generic="8f473684764409c90f15df3edd7f682009600e4a5ec08dcc0c426c3db04b062da68951154fc95d1f00ad97fd18bdbf66639ae742c2e3f33e5a67f008301bed803fb9446127e1f3b723e0b156ea716fe28a6535464b03311d6b123b903b34b8996d7a64ac6e23c8e1bc5360b0472dacef4d3235e1", @typed={0xe, 0x52, 0x0, 0x0, @str='/dev/rtc0\x00'}, @typed={0x8, 0x5e, 0x0, 0x0, @uid=0xee01}, @typed={0x8, 0x2f, 0x0, 0x0, @fd=r1}]}]}, 0x15c}], 0x9, &(0x7f00000078c0)=[@rights={{0x28, 0x1, 0x1, [r5, r0, r2, r0, r7, r2]}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, 0xffffffffffffffff}}}], 0x48, 0x4000}, 0x4)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2330.509755] ? loop_set_status_old+0x1b0/0x1b0
[ 2330.509773] blkdev_ioctl+0x356/0x7f0
[ 2330.509785] ? blkdev_common_ioctl+0x1990/0x1990
[ 2330.509797] ? selinux_file_ioctl+0xb1/0x260
[ 2330.509815] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2330.509834] ? blkdev_common_ioctl+0x1990/0x1990
[ 2330.509848] __x64_sys_ioctl+0x196/0x210
[ 2330.509868] do_syscall_64+0x3b/0x90
[ 2330.509882] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2330.509899] RIP: 0033:0x7f1d2141e8d7
[ 2330.509909] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2330.509922] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 2330.509933] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141e8d7
[ 2330.509942] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005
[ 2330.509949] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90
[ 2330.509957] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000008
21:25:14 executing program 7:
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 97)
21:25:14 executing program 5:
syz_read_part_table(0xfffffffd, 0x0, 0x0)
21:25:14 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x5386, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:25:14 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x4b49, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2330.509964] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f1d1e993f80
[ 2330.509984]
[ 2330.527824] loop2: detected capacity change from 0 to 215922
[ 2330.547535] loop6: detected capacity change from 0 to 215922
[ 2330.557077] FAULT_INJECTION: forcing a failure.
[ 2330.557077] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2330.557096] CPU: 1 PID: 9909 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2330.557110] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2330.557118] Call Trace:
[ 2330.557122]
[ 2330.557127] dump_stack_lvl+0x8b/0xb3
[ 2330.557148] should_fail.cold+0x5/0xa
[ 2330.557162] strncpy_from_user+0x34/0x3d0
[ 2330.557185] getname_flags.part.0+0x95/0x4f0
[ 2330.557203] ? kmem_cache_free+0xe0/0x420
[ 2330.557226] getname_flags+0x9a/0xe0
[ 2330.557243] vfs_fstatat+0x73/0xb0
[ 2330.557264] __do_sys_newstat+0x88/0x110
[ 2330.557282] ? __ia32_sys_stat+0x70/0x70
[ 2330.557299] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 2330.557319] ? xfd_validate_state+0x59/0x180
[ 2330.557338] ? restore_fpregs_from_fpstate+0xcc/0x1e0
[ 2330.557362] ? syscall_enter_from_user_mode+0x1d/0x50
[ 2330.557382] ? lockdep_hardirqs_on+0x79/0x100
[ 2330.557401] do_syscall_64+0x3b/0x90
[ 2330.557415] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2330.557433] RIP: 0033:0x7f5b6be25b16
[ 2330.557443] Code: 28 c3 66 90 48 c7 c0 ff ff ff ff eb e0 e8 f2 29 00 00 66 90 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02
[ 2330.557454] RSP: 002b:00007f5b69359ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004
[ 2330.557466] RAX: ffffffffffffffda RBX: 00007f5b69359f40 RCX: 00007f5b6be25b16
[ 2330.557474] RDX: 00007f5b69359fc0 RSI: 00007f5b69359fc0 RDI: 00007f5b69359f40
[ 2330.557482] RBP: 00007f5b6935a6bc R08: 0000000000000001 R09: 00007f5b69359d90
[ 2330.557489] R10: 00007f5b69359c47 R11: 0000000000000246 R12: 0000000000000007
[ 2330.557496] R13: 00007f5b69359fc0 R14: 0000000000000000 R15: 00007f5b69359f80
[ 2330.557516]
[ 2330.590978] loop7: detected capacity change from 0 to 215922
[ 2330.600290] FAULT_INJECTION: forcing a failure.
[ 2330.600290] name failslab, interval 1, probability 0, space 0, times 0
[ 2330.600308] CPU: 0 PID: 9916 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2330.600322] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2330.600331] Call Trace:
[ 2330.600335]
[ 2330.600340] dump_stack_lvl+0x8b/0xb3
[ 2330.600361] should_fail.cold+0x5/0xa
[ 2330.600374] ? create_object.isra.0+0x3a/0xa20
[ 2330.600398] should_failslab+0x5/0x10
[ 2330.600416] kmem_cache_alloc+0x5b/0x480
[ 2330.600440] create_object.isra.0+0x3a/0xa20
[ 2330.600455] ? kasan_unpoison+0x23/0x50
[ 2330.600473] __kmalloc+0x25b/0x440
[ 2330.600494] kobject_get_path+0xc0/0x1d0
[ 2330.600513] kobject_uevent_env+0x25c/0xfa0
[ 2330.600530] ? kernfs_put+0x42/0x50
[ 2330.600556] __loop_clr_fd+0x2f8/0x8b0
[ 2330.600576] lo_ioctl+0x632/0x1990
[ 2330.600591] ? vfs_fstatat+0x97/0xb0
[ 2330.600612] ? loop_set_status_old+0x1b0/0x1b0
[ 2330.600627] ? avc_ss_reset+0x180/0x180
[ 2330.600657] ? __lock_acquire+0xbac/0x6120
[ 2330.600684] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2330.600702] ? lock_is_held_type+0xd7/0x130
[ 2330.600719] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2330.600739] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[ 2330.600758] ? do_vfs_ioctl+0x132/0x1610
[ 2330.600777] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2330.600797] ? blkdev_common_ioctl+0x1ad/0x1990
[ 2330.600810] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400
[ 2330.600828] ? blkdev_bszset+0x1f0/0x1f0
[ 2330.600841] ? selinux_inode_getsecctx+0x90/0x90
[ 2330.600860] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2330.600880] ? __ia32_sys_stat+0x70/0x70
[ 2330.600901] ? loop_set_status_old+0x1b0/0x1b0
[ 2330.600918] blkdev_ioctl+0x356/0x7f0
[ 2330.600930] ? blkdev_common_ioctl+0x1990/0x1990
[ 2330.600942] ? selinux_file_ioctl+0xb1/0x260
[ 2330.600960] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2330.600978] ? blkdev_common_ioctl+0x1990/0x1990
[ 2330.600992] __x64_sys_ioctl+0x196/0x210
[ 2330.601013] do_syscall_64+0x3b/0x90
[ 2330.601027] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2330.601044] RIP: 0033:0x7f1d2141e8d7
[ 2330.601055] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2330.601069] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 2330.601083] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141e8d7
[ 2330.601091] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005
[ 2330.601098] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90
[ 2330.601106] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000008
[ 2330.601113] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f1d1e993f80
[ 2330.601133]
[ 2330.659946] loop5: detected capacity change from 0 to 264192
[ 2330.693082] loop4: detected capacity change from 0 to 215922
[ 2330.734414] loop2: detected capacity change from 0 to 215922
[ 2330.745505] loop2: detected capacity change from 0 to 215922
21:25:31 executing program 7:
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 98)
21:25:31 executing program 5:
syz_read_part_table(0xfffffffe, 0x0, 0x0)
21:25:31 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:25:31 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x5382, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:25:31 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 93)
21:25:31 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0xee00, 0xee01}}, './file0\x00'})
mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x40010, r3, 0x3)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:25:31 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x541b, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:25:31 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xfeffffffffffffff, 0x0)
[ 2347.941538] 9pnet_fd: p9_fd_create_tcp (9939): problem connecting socket to 127.0.0.1
[ 2347.946485] loop2: detected capacity change from 0 to 215922
[ 2347.950893] loop5: detected capacity change from 0 to 264192
[ 2347.951334] loop4: detected capacity change from 0 to 215922
[ 2347.971391] loop7: detected capacity change from 0 to 215922
21:25:31 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xffffffff00000000, 0x0)
[ 2347.986377] loop6: detected capacity change from 0 to 215922
[ 2348.007966] FAULT_INJECTION: forcing a failure.
[ 2348.007966] name failslab, interval 1, probability 0, space 0, times 0
[ 2348.007990] CPU: 1 PID: 9947 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2348.008006] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2348.008016] Call Trace:
[ 2348.008021]
[ 2348.008027] dump_stack_lvl+0x8b/0xb3
[ 2348.008050] should_fail.cold+0x5/0xa
[ 2348.008066] ? create_object.isra.0+0x3a/0xa20
[ 2348.008090] should_failslab+0x5/0x10
[ 2348.008111] kmem_cache_alloc+0x5b/0x480
[ 2348.008140] create_object.isra.0+0x3a/0xa20
[ 2348.008159] ? kasan_unpoison+0x23/0x50
[ 2348.008181] __kmalloc_node_track_caller+0x269/0x440
[ 2348.008205] ? alloc_uevent_skb+0x7b/0x210
[ 2348.008230] __alloc_skb+0xe3/0x340
[ 2348.008253] alloc_uevent_skb+0x7b/0x210
[ 2348.008277] kobject_uevent_env+0xaa4/0xfa0
21:25:31 executing program 5:
syz_read_part_table(0x1000000000, 0x0, 0x0)
[ 2348.008300] ? kernfs_put+0x42/0x50
[ 2348.008330] __loop_clr_fd+0x2f8/0x8b0
[ 2348.008361] lo_ioctl+0x632/0x1990
[ 2348.008384] ? vfs_fstatat+0x97/0xb0
[ 2348.008414] ? loop_set_status_old+0x1b0/0x1b0
21:25:31 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xfffffffffffff000, 0x0)
[ 2348.008436] ? avc_ss_reset+0x180/0x180
21:25:31 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 94)
[ 2348.008478] ? __lock_acquire+0xbac/0x6120
[ 2348.008517] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2348.008543] ? lock_is_held_type+0xd7/0x130
[ 2348.008566] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2348.008595] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[ 2348.008623] ? do_vfs_ioctl+0x132/0x1610
[ 2348.008649] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2348.008677] ? blkdev_common_ioctl+0x1ad/0x1990
[ 2348.008695] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400
[ 2348.008720] ? blkdev_bszset+0x1f0/0x1f0
[ 2348.008737] ? selinux_inode_getsecctx+0x90/0x90
[ 2348.008764] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2348.008791] ? __ia32_sys_stat+0x70/0x70
[ 2348.008819] ? loop_set_status_old+0x1b0/0x1b0
[ 2348.008845] blkdev_ioctl+0x356/0x7f0
[ 2348.008862] ? blkdev_common_ioctl+0x1990/0x1990
[ 2348.008878] ? selinux_file_ioctl+0xb1/0x260
[ 2348.008905] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2348.008934] ? blkdev_common_ioctl+0x1990/0x1990
[ 2348.008958] __x64_sys_ioctl+0x196/0x210
[ 2348.008988] do_syscall_64+0x3b/0x90
[ 2348.009009] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2348.009033] RIP: 0033:0x7f1d2141e8d7
[ 2348.009047] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2348.009062] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
21:25:31 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r1, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0)
write$binfmt_aout(r1, &(0x7f00000003c0)={{0xcc, 0x4, 0x5, 0x2f0, 0x376, 0x6, 0x88, 0x3}, "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x820)
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:25:31 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x5385, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:25:31 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x5421, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:25:31 executing program 7:
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 99)
[ 2348.009079] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141e8d7
[ 2348.009091] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005
[ 2348.009102] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90
[ 2348.009112] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000008
[ 2348.009122] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f1d1e993f80
[ 2348.009155]
[ 2348.020270] loop5: detected capacity change from 0 to 264192
[ 2348.020852] FAULT_INJECTION: forcing a failure.
[ 2348.020852] name failslab, interval 1, probability 0, space 0, times 0
[ 2348.020881] CPU: 1 PID: 9938 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2348.020905] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2348.020919] Call Trace:
[ 2348.020925]
[ 2348.020934] dump_stack_lvl+0x8b/0xb3
[ 2348.020966] should_fail.cold+0x5/0xa
[ 2348.020989] ? kobject_get_path+0xc0/0x1d0
[ 2348.021016] should_failslab+0x5/0x10
[ 2348.021046] __kmalloc+0x72/0x440
[ 2348.021085] kobject_get_path+0xc0/0x1d0
[ 2348.021108] kobject_uevent_env+0x25c/0xfa0
[ 2348.021134] ? kernfs_put+0x42/0x50
[ 2348.021166] __loop_clr_fd+0x2f8/0x8b0
[ 2348.021193] lo_ioctl+0x632/0x1990
[ 2348.021220] ? vfs_fstatat+0x97/0xb0
[ 2348.021250] ? loop_set_status_old+0x1b0/0x1b0
[ 2348.021274] ? avc_ss_reset+0x180/0x180
[ 2348.021318] ? __lock_acquire+0xbac/0x6120
[ 2348.021355] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2348.021382] ? lock_is_held_type+0xd7/0x130
[ 2348.021404] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2348.021433] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
21:25:32 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xfffffffffffffffe, 0x0)
21:25:32 executing program 5:
syz_read_part_table(0x8000000000000, 0x0, 0x0)
[ 2348.021462] ? do_vfs_ioctl+0x132/0x1610
[ 2348.021492] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2348.021522] ? blkdev_common_ioctl+0x1ad/0x1990
[ 2348.021541] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400
[ 2348.021566] ? blkdev_bszset+0x1f0/0x1f0
[ 2348.021583] ? selinux_inode_getsecctx+0x90/0x90
[ 2348.021612] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2348.021640] ? __ia32_sys_stat+0x70/0x70
[ 2348.021669] ? loop_set_status_old+0x1b0/0x1b0
[ 2348.021697] blkdev_ioctl+0x356/0x7f0
[ 2348.021715] ? blkdev_common_ioctl+0x1990/0x1990
[ 2348.021732] ? selinux_file_ioctl+0xb1/0x260
[ 2348.021761] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2348.021788] ? blkdev_common_ioctl+0x1990/0x1990
[ 2348.021809] __x64_sys_ioctl+0x196/0x210
[ 2348.021837] do_syscall_64+0x3b/0x90
[ 2348.021862] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2348.021893] RIP: 0033:0x7f5b6be268d7
[ 2348.021911] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2348.021932] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 2348.021954] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be268d7
[ 2348.021970] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 000000000000000a
[ 2348.021983] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2348.022017] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000008
[ 2348.022026] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2348.022056]
[ 2348.040207] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[ 2348.040239] Buffer I/O error on dev loop5, logical block 0, async page read
[ 2348.040297] loop5: unable to read partition table
[ 2348.040394] loop5: partition table beyond EOD, truncated
[ 2348.063053] loop2: detected capacity change from 0 to 215922
[ 2348.080542] loop4: detected capacity change from 0 to 215922
[ 2348.258679] loop5: detected capacity change from 0 to 264192
[ 2348.277803] loop4: detected capacity change from 0 to 215922
[ 2348.326912] loop6: detected capacity change from 0 to 215922
[ 2348.346526] loop2: detected capacity change from 0 to 215922
[ 2348.373238] FAULT_INJECTION: forcing a failure.
[ 2348.373238] name failslab, interval 1, probability 0, space 0, times 0
[ 2348.373264] CPU: 1 PID: 9971 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2348.373284] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2348.373296] Call Trace:
[ 2348.373302]
[ 2348.373308] dump_stack_lvl+0x8b/0xb3
[ 2348.373335] should_fail.cold+0x5/0xa
[ 2348.373355] ? __alloc_skb+0x211/0x340
[ 2348.373378] should_failslab+0x5/0x10
[ 2348.373403] kmem_cache_alloc_node+0x55/0x490
[ 2348.373442] __alloc_skb+0x211/0x340
[ 2348.373467] alloc_uevent_skb+0x7b/0x210
[ 2348.373495] kobject_uevent_env+0xaa4/0xfa0
[ 2348.373525] ? kernfs_put+0x42/0x50
[ 2348.373568] __loop_clr_fd+0x2f8/0x8b0
[ 2348.373600] lo_ioctl+0x632/0x1990
[ 2348.373627] ? vfs_fstatat+0x97/0xb0
[ 2348.373667] ? loop_set_status_old+0x1b0/0x1b0
[ 2348.373691] ? avc_ss_reset+0x180/0x180
[ 2348.373742] ? __lock_acquire+0xbac/0x6120
[ 2348.373788] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2348.373821] ? lock_is_held_type+0xd7/0x130
[ 2348.373847] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2348.373876] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[ 2348.373907] ? do_vfs_ioctl+0x132/0x1610
[ 2348.373939] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2348.373971] ? blkdev_common_ioctl+0x1ad/0x1990
[ 2348.373990] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400
[ 2348.374034] ? blkdev_bszset+0x1f0/0x1f0
[ 2348.374053] ? selinux_inode_getsecctx+0x90/0x90
[ 2348.374083] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2348.374112] ? __ia32_sys_stat+0x70/0x70
[ 2348.374144] ? loop_set_status_old+0x1b0/0x1b0
[ 2348.374175] blkdev_ioctl+0x356/0x7f0
[ 2348.374195] ? blkdev_common_ioctl+0x1990/0x1990
[ 2348.374214] ? selinux_file_ioctl+0xb1/0x260
[ 2348.374246] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2348.374277] ? blkdev_common_ioctl+0x1990/0x1990
[ 2348.374301] __x64_sys_ioctl+0x196/0x210
[ 2348.374336] do_syscall_64+0x3b/0x90
[ 2348.374360] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2348.374387] RIP: 0033:0x7f5b6be268d7
[ 2348.374401] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2348.374419] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 2348.374438] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be268d7
[ 2348.374451] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 000000000000000b
[ 2348.374463] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2348.374475] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000008
[ 2348.374486] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2348.374520]
[ 2348.434163] loop2: detected capacity change from 0 to 215922
[ 2348.478218] loop7: detected capacity change from 0 to 215922
[ 2348.495486] FAULT_INJECTION: forcing a failure.
[ 2348.495486] name failslab, interval 1, probability 0, space 0, times 0
[ 2348.495512] CPU: 0 PID: 9979 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2348.495530] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2348.495541] Call Trace:
[ 2348.495546]
[ 2348.495558] dump_stack_lvl+0x8b/0xb3
[ 2348.495583] should_fail.cold+0x5/0xa
[ 2348.495601] ? skb_clone+0x170/0x3c0
[ 2348.495625] should_failslab+0x5/0x10
[ 2348.495651] kmem_cache_alloc+0x5b/0x480
[ 2348.495684] skb_clone+0x170/0x3c0
[ 2348.495710] netlink_broadcast+0x9b1/0xd70
[ 2348.495746] ? alloc_uevent_skb+0x1c2/0x210
[ 2348.495771] kobject_uevent_env+0xa6b/0xfa0
[ 2348.495798] ? kernfs_put+0x42/0x50
[ 2348.495832] __loop_clr_fd+0x2f8/0x8b0
[ 2348.495859] lo_ioctl+0x632/0x1990
[ 2348.495883] ? vfs_fstatat+0x97/0xb0
[ 2348.495913] ? loop_set_status_old+0x1b0/0x1b0
[ 2348.495935] ? avc_ss_reset+0x180/0x180
[ 2348.495982] ? __lock_acquire+0xbac/0x6120
[ 2348.496023] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2348.496050] ? lock_is_held_type+0xd7/0x130
[ 2348.496073] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2348.496107] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[ 2348.496132] ? do_vfs_ioctl+0x132/0x1610
[ 2348.496158] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2348.496187] ? blkdev_common_ioctl+0x1ad/0x1990
[ 2348.496205] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400
[ 2348.496231] ? blkdev_bszset+0x1f0/0x1f0
[ 2348.496250] ? selinux_inode_getsecctx+0x90/0x90
[ 2348.496280] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2348.496310] ? __ia32_sys_stat+0x70/0x70
[ 2348.496340] ? loop_set_status_old+0x1b0/0x1b0
[ 2348.496367] blkdev_ioctl+0x356/0x7f0
[ 2348.496384] ? blkdev_common_ioctl+0x1990/0x1990
[ 2348.496403] ? selinux_file_ioctl+0xb1/0x260
[ 2348.496429] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2348.496453] ? blkdev_common_ioctl+0x1990/0x1990
[ 2348.496471] __x64_sys_ioctl+0x196/0x210
[ 2348.496498] do_syscall_64+0x3b/0x90
[ 2348.496517] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2348.496541] RIP: 0033:0x7f1d2141e8d7
[ 2348.496555] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2348.496571] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 2348.496589] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141e8d7
[ 2348.496601] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005
[ 2348.496612] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90
[ 2348.496622] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000008
[ 2348.496634] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f1d1e993f80
[ 2348.496667]
21:25:49 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:25:49 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x60, 0x0, 0x6, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0))
21:25:49 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xffffffffffffffff, 0x0)
21:25:49 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x5386, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:25:49 executing program 5:
syz_read_part_table(0x40000000000000, 0x0, 0x0)
21:25:49 executing program 7:
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 100)
21:25:49 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x5450, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:25:49 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 95)
[ 2365.792272] loop2: detected capacity change from 0 to 215922
[ 2365.794414] loop7: detected capacity change from 0 to 215922
[ 2365.799666] 9pnet_fd: p9_fd_create_tcp (10000): problem connecting socket to 127.0.0.1
[ 2365.804819] loop4: detected capacity change from 0 to 215922
[ 2365.819115] loop6: detected capacity change from 0 to 215922
[ 2365.833650] loop5: detected capacity change from 0 to 264192
[ 2365.845834] FAULT_INJECTION: forcing a failure.
[ 2365.845834] name failslab, interval 1, probability 0, space 0, times 0
[ 2365.845861] CPU: 1 PID: 9997 Comm: syz-executor.7 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2365.845881] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2365.845893] Call Trace:
[ 2365.845898]
[ 2365.845905] dump_stack_lvl+0x8b/0xb3
[ 2365.845930] should_fail.cold+0x5/0xa
[ 2365.845948] ? kobject_uevent_env+0x236/0xfa0
[ 2365.845970] should_failslab+0x5/0x10
[ 2365.845993] kmem_cache_alloc_trace+0x55/0x3c0
[ 2365.846026] kobject_uevent_env+0x236/0xfa0
[ 2365.846047] ? dev_uevent_filter+0xd0/0xd0
[ 2365.846074] ? __mutex_unlock_slowpath+0x15c/0x5e0
[ 2365.846096] disk_event_uevent+0x17b/0x1e0
[ 2365.846125] ? disk_events_async_show+0x10/0x10
[ 2365.846164] disk_force_media_change+0x1e/0xc0
[ 2365.846189] __loop_clr_fd+0x5d9/0x8b0
[ 2365.846215] lo_ioctl+0x632/0x1990
[ 2365.846238] ? vfs_fstatat+0x97/0xb0
[ 2365.846315] ? loop_set_status_old+0x1b0/0x1b0
[ 2365.846337] ? avc_ss_reset+0x180/0x180
[ 2365.846383] ? __lock_acquire+0xbac/0x6120
[ 2365.846421] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2365.846449] ? lock_is_held_type+0xd7/0x130
[ 2365.846471] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2365.846499] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
21:25:49 executing program 7:
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2365.846527] ? do_vfs_ioctl+0x132/0x1610
[ 2365.846557] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2365.846589] ? blkdev_common_ioctl+0x1ad/0x1990
[ 2365.846609] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400
[ 2365.846637] ? blkdev_bszset+0x1f0/0x1f0
21:25:49 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 96)
21:25:49 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0xffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
recvmsg$unix(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/146, 0x92}, {&(0x7f0000000580)=""/139, 0x8b}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000000640)=""/235, 0xeb}], 0x4, &(0x7f0000000780)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xc0}, 0x40002042)
perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0xfa, 0x70, 0x6, 0x0, 0x81, 0x8c1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000400), 0x6}, 0x8404, 0x22a, 0x9, 0x3, 0x3, 0x8, 0x3, 0x0, 0x4, 0x0, 0x8}, r5, 0xd, r0, 0x1)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4, @ANYBLOB="02001e00"], 0x18}, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'veth1\x00'})
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2365.846655] ? selinux_inode_getsecctx+0x90/0x90
[ 2365.846683] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2365.846712] ? __ia32_sys_stat+0x70/0x70
[ 2365.846744] ? loop_set_status_old+0x1b0/0x1b0
[ 2365.846770] blkdev_ioctl+0x356/0x7f0
[ 2365.846787] ? blkdev_common_ioctl+0x1990/0x1990
[ 2365.846805] ? selinux_file_ioctl+0xb1/0x260
[ 2365.846831] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2365.846856] ? blkdev_common_ioctl+0x1990/0x1990
21:25:49 executing program 5:
syz_read_part_table(0xf0ffffffffffff, 0x0, 0x0)
21:25:49 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f00000003c0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback}, 0xc)
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'geneve1\x00'})
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
flock(r4, 0x0)
21:25:49 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x5451, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2365.846880] __x64_sys_ioctl+0x196/0x210
[ 2365.846913] do_syscall_64+0x3b/0x90
[ 2365.846935] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2365.846961] RIP: 0033:0x7f1d2141e8d7
[ 2365.846976] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2365.846994] RSP: 002b:00007f1d1e993ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 2365.847012] RAX: ffffffffffffffda RBX: 00007f1d1e993f40 RCX: 00007f1d2141e8d7
[ 2365.847025] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005
[ 2365.847036] RBP: 00007f1d1e9946bc R08: 0000000000000001 R09: 00007f1d1e993d90
21:25:49 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x541b, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2365.847047] R10: 00007f1d1e993c47 R11: 0000000000000246 R12: 0000000000000008
[ 2365.847058] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f1d1e993f80
[ 2365.847087]
[ 2365.850214] FAULT_INJECTION: forcing a failure.
[ 2365.850214] name failslab, interval 1, probability 0, space 0, times 0
[ 2365.850240] CPU: 1 PID: 10004 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2365.850279] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
21:25:49 executing program 5:
syz_read_part_table(0x100000000000000, 0x0, 0x0)
[ 2365.850290] Call Trace:
[ 2365.850294]
[ 2365.850301] dump_stack_lvl+0x8b/0xb3
[ 2365.850328] should_fail.cold+0x5/0xa
[ 2365.850350] ? __alloc_skb+0x211/0x340
[ 2365.850374] should_failslab+0x5/0x10
[ 2365.850400] kmem_cache_alloc_node+0x55/0x490
[ 2365.850442] __alloc_skb+0x211/0x340
[ 2365.850471] alloc_uevent_skb+0x7b/0x210
[ 2365.850496] kobject_uevent_env+0xaa4/0xfa0
[ 2365.850521] ? kernfs_put+0x42/0x50
[ 2365.850565] __loop_clr_fd+0x2f8/0x8b0
[ 2365.850596] lo_ioctl+0x632/0x1990
[ 2365.850621] ? vfs_fstatat+0x97/0xb0
[ 2365.850652] ? loop_set_status_old+0x1b0/0x1b0
[ 2365.850673] ? avc_ss_reset+0x180/0x180
[ 2365.850717] ? __lock_acquire+0xbac/0x6120
[ 2365.850757] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2365.850786] ? lock_is_held_type+0xd7/0x130
[ 2365.850809] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2365.850838] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[ 2365.850868] ? do_vfs_ioctl+0x132/0x1610
[ 2365.850898] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2365.850928] ? blkdev_common_ioctl+0x1ad/0x1990
[ 2365.850947] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400
[ 2365.850977] ? blkdev_bszset+0x1f0/0x1f0
[ 2365.850998] ? selinux_inode_getsecctx+0x90/0x90
[ 2365.851029] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2365.851061] ? __ia32_sys_stat+0x70/0x70
[ 2365.851092] ? loop_set_status_old+0x1b0/0x1b0
[ 2365.851119] blkdev_ioctl+0x356/0x7f0
[ 2365.851138] ? blkdev_common_ioctl+0x1990/0x1990
[ 2365.851158] ? selinux_file_ioctl+0xb1/0x260
[ 2365.851186] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2365.851215] ? blkdev_common_ioctl+0x1990/0x1990
[ 2365.851237] __x64_sys_ioctl+0x196/0x210
[ 2365.851270] do_syscall_64+0x3b/0x90
[ 2365.851292] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2365.851318] RIP: 0033:0x7f5b6be268d7
[ 2365.851333] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2365.851354] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 2365.851372] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be268d7
[ 2365.851386] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 000000000000000a
[ 2365.851399] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2365.851412] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000008
[ 2365.851424] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2365.851458]
[ 2365.865090] loop5: detected capacity change from 0 to 264192
[ 2365.886532] loop2: detected capacity change from 0 to 215922
[ 2366.052205] loop7: detected capacity change from 0 to 215922
[ 2366.056939] loop5: detected capacity change from 0 to 264192
[ 2366.061175] loop6: detected capacity change from 0 to 215922
[ 2366.067174] loop5: detected capacity change from 0 to 264192
[ 2366.083326] FAULT_INJECTION: forcing a failure.
[ 2366.083326] name failslab, interval 1, probability 0, space 0, times 0
[ 2366.083349] CPU: 1 PID: 10014 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2366.083366] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2366.083375] Call Trace:
[ 2366.083380]
[ 2366.083386] dump_stack_lvl+0x8b/0xb3
[ 2366.083407] should_fail.cold+0x5/0xa
[ 2366.083426] ? __alloc_skb+0x211/0x340
[ 2366.083447] should_failslab+0x5/0x10
[ 2366.083470] kmem_cache_alloc_node+0x55/0x490
[ 2366.083504] __alloc_skb+0x211/0x340
[ 2366.083526] alloc_uevent_skb+0x7b/0x210
[ 2366.083554] kobject_uevent_env+0xaa4/0xfa0
[ 2366.083577] ? kernfs_put+0x42/0x50
[ 2366.083605] __loop_clr_fd+0x2f8/0x8b0
[ 2366.083633] lo_ioctl+0x632/0x1990
[ 2366.083657] ? vfs_fstatat+0x97/0xb0
[ 2366.083688] ? loop_set_status_old+0x1b0/0x1b0
[ 2366.083707] ? avc_ss_reset+0x180/0x180
[ 2366.083746] ? __lock_acquire+0xbac/0x6120
[ 2366.083781] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2366.083806] ? lock_is_held_type+0xd7/0x130
[ 2366.083830] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2366.083860] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[ 2366.083886] ? do_vfs_ioctl+0x132/0x1610
[ 2366.083910] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2366.083936] ? blkdev_common_ioctl+0x1ad/0x1990
[ 2366.083952] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400
[ 2366.083976] ? blkdev_bszset+0x1f0/0x1f0
[ 2366.083993] ? selinux_inode_getsecctx+0x90/0x90
[ 2366.084024] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2366.084053] ? __ia32_sys_stat+0x70/0x70
[ 2366.084081] ? loop_set_status_old+0x1b0/0x1b0
[ 2366.084105] blkdev_ioctl+0x356/0x7f0
[ 2366.084121] ? blkdev_common_ioctl+0x1990/0x1990
[ 2366.084137] ? selinux_file_ioctl+0xb1/0x260
[ 2366.084164] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2366.084193] ? blkdev_common_ioctl+0x1990/0x1990
[ 2366.084215] __x64_sys_ioctl+0x196/0x210
[ 2366.084242] do_syscall_64+0x3b/0x90
[ 2366.084261] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2366.084282] RIP: 0033:0x7f5b6be268d7
[ 2366.084295] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2366.084309] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 2366.084325] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be268d7
[ 2366.084335] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 000000000000000b
[ 2366.084346] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2366.084358] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000008
[ 2366.084368] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2366.084401]
[ 2366.094927] loop4: detected capacity change from 0 to 215922
[ 2366.185170] loop5: detected capacity change from 0 to 264192
[ 2366.187798] loop2: detected capacity change from 0 to 215922
[ 2366.199959] loop5: detected capacity change from 0 to 264192
21:26:04 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x5452, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:04 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000440), 0xa1dc0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0)
sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f0000000540)={&(0x7f0000000480), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, 0x2, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x4}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0xec90f599dccb34ba}, 0x80)
r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x81, 0x0, 0x2, 0x1f, 0x0, 0x1, 0x12e, 0x6, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0xb, 0x7, 0x3, 0x3, 0x2, 0x1f, 0xfc00, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r4, 0x1)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:04 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0)
fstat(r0, &(0x7f00000003c0))
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:04 executing program 5:
syz_read_part_table(0x200000000000000, 0x0, 0x0)
21:26:04 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x5421, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:04 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:26:04 executing program 7:
syz_read_part_table(0x696e5b3, 0x2, 0x0)
21:26:04 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 97)
[ 2380.698336] 9pnet_fd: p9_fd_create_tcp (10044): problem connecting socket to 127.0.0.1
[ 2380.725700] loop5: detected capacity change from 0 to 264192
[ 2380.789506] loop2: detected capacity change from 0 to 215922
[ 2380.820505] loop4: detected capacity change from 0 to 215922
[ 2380.873723] loop5: detected capacity change from 0 to 264192
21:26:04 executing program 7:
syz_read_part_table(0x696e5b3, 0x3, 0x0)
[ 2380.885532] loop2: detected capacity change from 0 to 215922
21:26:04 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10040041}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0xb4, 0x0, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @DEVLINK_ATTR_RATE_PARENT_NODE_NAME={0xf, 0xa9, @name2}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x2}, @DEVLINK_ATTR_RATE_TX_SHARE={0xc, 0xa6, 0x8}, @DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x8}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}]}, 0xb4}}, 0x8080)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:04 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x5450, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:04 executing program 5:
syz_read_part_table(0x300000000000000, 0x0, 0x0)
[ 2381.139383] loop6: detected capacity change from 0 to 215922
21:26:04 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f00000000c0)={0x80000000})
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2381.203154] loop2: detected capacity change from 0 to 215922
[ 2381.245071] FAULT_INJECTION: forcing a failure.
[ 2381.245071] name failslab, interval 1, probability 0, space 0, times 0
[ 2381.245117] CPU: 0 PID: 10055 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2381.245149] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2381.245169] Call Trace:
[ 2381.245177]
[ 2381.245188] dump_stack_lvl+0x8b/0xb3
[ 2381.245232] should_fail.cold+0x5/0xa
[ 2381.245268] ? create_object.isra.0+0x3a/0xa20
[ 2381.245324] should_failslab+0x5/0x10
[ 2381.245379] kmem_cache_alloc+0x5b/0x480
[ 2381.245452] create_object.isra.0+0x3a/0xa20
[ 2381.245501] ? kasan_unpoison+0x23/0x50
[ 2381.245558] kmem_cache_alloc_trace+0x22e/0x3c0
[ 2381.245631] kobject_uevent_env+0x236/0xfa0
[ 2381.245678] ? dev_uevent_filter+0xd0/0xd0
[ 2381.245729] ? kernfs_put+0x42/0x50
[ 2381.245800] __loop_clr_fd+0x2f8/0x8b0
[ 2381.245857] lo_ioctl+0x632/0x1990
[ 2381.245904] ? vfs_fstatat+0x97/0xb0
[ 2381.245971] ? loop_set_status_old+0x1b0/0x1b0
[ 2381.246015] ? avc_ss_reset+0x180/0x180
[ 2381.246109] ? __lock_acquire+0xbac/0x6120
[ 2381.246192] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2381.246248] ? lock_is_held_type+0xd7/0x130
[ 2381.246298] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2381.246356] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[ 2381.246417] ? do_vfs_ioctl+0x132/0x1610
[ 2381.246477] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2381.246553] ? blkdev_common_ioctl+0x1ad/0x1990
[ 2381.246597] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400
[ 2381.246656] ? blkdev_bszset+0x1f0/0x1f0
[ 2381.246693] ? selinux_inode_getsecctx+0x90/0x90
[ 2381.246758] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
21:26:04 executing program 7:
syz_read_part_table(0x696e5b3, 0x4, 0x0)
21:26:04 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x5460, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:05 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x998, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x20000000001000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x14)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2381.246832] ? loop_set_status_old+0x1b0/0x1b0
[ 2381.246890] blkdev_ioctl+0x356/0x7f0
[ 2381.246928] ? blkdev_common_ioctl+0x1990/0x1990
[ 2381.246967] ? selinux_file_ioctl+0xb1/0x260
[ 2381.247025] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2381.247087] ? blkdev_common_ioctl+0x1990/0x1990
[ 2381.247135] __x64_sys_ioctl+0x196/0x210
21:26:05 executing program 5:
syz_read_part_table(0x400000000000000, 0x0, 0x0)
[ 2381.247203] do_syscall_64+0x3b/0x90
[ 2381.247248] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2381.247302] RIP: 0033:0x7f5b6be268d7
[ 2381.247331] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2381.247367] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 2381.247403] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be268d7
[ 2381.247430] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 000000000000000b
[ 2381.247453] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2381.247478] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000008
[ 2381.247502] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2381.247567]
[ 2381.266777] loop5: detected capacity change from 0 to 264192
[ 2381.460098] loop2: detected capacity change from 0 to 215922
[ 2381.475167] loop4: detected capacity change from 0 to 215922
[ 2381.674427] loop5: detected capacity change from 0 to 264192
[ 2381.688164] loop5: detected capacity change from 0 to 264192
21:26:22 executing program 5:
syz_read_part_table(0x500000000000000, 0x0, 0x0)
21:26:22 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
r2 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r6, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r7]}}], 0x18}, 0x0)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680)=[{{&(0x7f00000003c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000440)="e308645ab9b9bb69c14e520ccc5c8250e97b3a0a16895ea218e7f9a55484b09c1377a43e0daf377311fa28d32558db8800c2b96221eb8045932e5ed21b387fad563d943c58863a28a81c6d5be5b71f649ecef590ff53dbced382c7ebd2ff02a5ca98ea8a0625e35001d2301c9740ca061c9375d19735955aec8b47082a990266016a8cca27a74595ea", 0x89}, {&(0x7f0000000500)="61cd786de10c4bee76bd8215898418833d71d6c733c394f1674a360547fe16e228466048ca304323abbf893e40d22a4b8658d017cc2e148e2e0536c053d19299c52e0a9c9093381a188d06bef23fb92205bdad0bcbe497126ccb8be3badbd7a5c9b751006a6ea88c444bd7ffffaae38e92d094fc8f4204a1730e42a083829a1d5679e398199761452546eba0178a2b2f23f5085ee41efd483b709bab24d5e160fdfbd742a77eb5c5474cb0d77db6d70e1d7564e147d791ab4224c932a72462c0115ce6ef9c55d075af8d520e013aeb660d90bead7b6708f5eb099fa7678e0eb5dfa71c4b07938445dc1548", 0xeb}], 0x2, &(0x7f0000000640)=[@rights={{0x24, 0x1, 0x1, [r4, r1, r3, r0, r7]}}], 0x28, 0x4040}}], 0x1, 0x40c0004)
r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
sendfile(r2, r8, &(0x7f00000000c0)=0xc5, 0x8)
21:26:22 executing program 7:
syz_read_part_table(0x696e5b3, 0x5, 0x0)
21:26:22 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 98)
21:26:22 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x40049409, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:22 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:26:22 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x5451, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2398.670768] loop5: detected capacity change from 0 to 264192
21:26:22 executing program 3:
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000400)={0x80, "e49ebde065edcbcd7c34ee453a3d3085a4b3b4686769e199680014e03db5088aec353c229f25af747683b7c237282622ef5863657f7cdb767ab75a7ddaed36b94040c9e4068e34512d6c2b47976c9fd0911d756b4b72468e00bc81a7b145638bfe9c03c3186d981df5070d9b48e31b8835c15c8f6a9ba4a35f50d79acbd84bdd72aadb1657fc5159aca010ee92e1061709e71a9ae2be24ea8aa2f9cf251dd1e6bfcad82e45412022947240c52780745e82848e63bb88fbc517c851b39a094b619fad419768649fa8c8f4d92fd70c76c7d3034d1e4de69e84971a229e0968e3de749f5a44dd6234d2ac3130bd44868a122b80ae00f5a05c7241f7fe78e01497cf944453ca53f40ca68a5cbf14c9af42d6028ea029c52d4c135f48e67b0b64eb6cab6c07f8ed8cae7b2fd3a4444652bec2841e0c200ee7f6d115e56ed16a8b7ff2f8666fc7db2360cd0916f560650fc3b60012a1bc47d31b7a6d93d2b2712ce502bbafc0de5120e075a0a70e304e1fa49ef0d126ffcf9d40e27c6cebb340369aa2dd8d44ae043271d6c887c39ccb2c851b23311d0776affa36587004230049ce048eff3074ef2a1db4310a06e17170239de096f709e7462817597125155b35e6befbd5e238e9e5322b71034bae60ed9aeb5d38e32a309b8e878e9dde33003a5478552dc434f657b2972616a6b53cc070a3d36e19c8692348ca6635db38f2c65314"})
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7}}, './file0\x00'})
r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0)
ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './file0\x00'})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r6]}}], 0x18}, 0x0)
ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000640)={{0x1, 0x1, 0x18, r5, {0xfffff800, 0x6}}, './file0\x00'})
[ 2398.689167] loop2: detected capacity change from 0 to 215922
[ 2398.761155] loop5: detected capacity change from 0 to 264192
21:26:22 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
r1 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
syz_open_dev$tty20(0xc, 0x4, 0x1)
sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r6, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r7]}}], 0x18}, 0x0)
r8 = open_tree(r1, &(0x7f00000000c0)='./file0\x00', 0x100)
r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x82002, 0x0)
ppoll(&(0x7f0000000400)=[{r5, 0x2400}, {r6, 0x20}, {r8, 0x3001}, {r3, 0x1020}, {r9, 0xc001}, {r3, 0x8}, {r3, 0x2000}, {r2, 0x200}], 0x8, &(0x7f0000000440), &(0x7f0000000480)={[0xdd]}, 0x8)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2398.776223] loop4: detected capacity change from 0 to 215922
[ 2398.777486] 9pnet_fd: p9_fd_create_tcp (10115): problem connecting socket to 127.0.0.1
[ 2398.784843] loop2: detected capacity change from 0 to 215922
21:26:22 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8, 0x9, 0xff, 0x80, 0x0, 0x780, 0x102, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x1, @perf_config_ext={0x3, 0x4a1}, 0x20, 0x0, 0x5, 0x9, 0x200, 0xfffffffa, 0x3f, 0x0, 0x9, 0x0, 0xfffffffffffffffd}, 0x0, 0x3, r0, 0x3)
r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x402, 0x40)
ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:22 executing program 7:
syz_read_part_table(0x696e5b3, 0x6, 0x0)
[ 2398.851926] loop6: detected capacity change from 0 to 215922
21:26:22 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x40086602, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:22 executing program 5:
syz_read_part_table(0x600000000000000, 0x0, 0x0)
[ 2398.895450] FAULT_INJECTION: forcing a failure.
[ 2398.895450] name failslab, interval 1, probability 0, space 0, times 0
[ 2398.895482] CPU: 1 PID: 10112 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2398.895503] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2398.895515] Call Trace:
[ 2398.895522]
[ 2398.895534] dump_stack_lvl+0x8b/0xb3
[ 2398.895562] should_fail.cold+0x5/0xa
[ 2398.895581] ? create_object.isra.0+0x3a/0xa20
[ 2398.895610] should_failslab+0x5/0x10
[ 2398.895635] kmem_cache_alloc+0x5b/0x480
[ 2398.895671] create_object.isra.0+0x3a/0xa20
[ 2398.895690] ? kasan_unpoison+0x23/0x50
[ 2398.895718] __kmalloc+0x25b/0x440
[ 2398.895752] kobject_get_path+0xc0/0x1d0
21:26:22 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x5452, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2398.895782] kobject_uevent_env+0x25c/0xfa0
[ 2398.895816] ? kernfs_put+0x42/0x50
[ 2398.895858] __loop_clr_fd+0x2f8/0x8b0
[ 2398.895896] lo_ioctl+0x632/0x1990
[ 2398.895928] ? vfs_fstatat+0x97/0xb0
[ 2398.895960] ? loop_set_status_old+0x1b0/0x1b0
[ 2398.895983] ? avc_ss_reset+0x180/0x180
[ 2398.896029] ? __lock_acquire+0xbac/0x6120
[ 2398.896071] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2398.896100] ? lock_is_held_type+0xd7/0x130
[ 2398.896125] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2398.896156] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[ 2398.896183] ? do_vfs_ioctl+0x132/0x1610
[ 2398.896211] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2398.896242] ? blkdev_common_ioctl+0x1ad/0x1990
[ 2398.896262] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400
[ 2398.896291] ? blkdev_bszset+0x1f0/0x1f0
[ 2398.896309] ? selinux_inode_getsecctx+0x90/0x90
[ 2398.896337] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2398.896367] ? __ia32_sys_stat+0x70/0x70
[ 2398.896397] ? loop_set_status_old+0x1b0/0x1b0
[ 2398.896424] blkdev_ioctl+0x356/0x7f0
[ 2398.896443] ? blkdev_common_ioctl+0x1990/0x1990
[ 2398.896461] ? selinux_file_ioctl+0xb1/0x260
[ 2398.896489] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2398.896518] ? blkdev_common_ioctl+0x1990/0x1990
[ 2398.896539] __x64_sys_ioctl+0x196/0x210
[ 2398.896569] do_syscall_64+0x3b/0x90
[ 2398.896589] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2398.896613] RIP: 0033:0x7f5b6be268d7
[ 2398.896628] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2398.896645] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 2398.896662] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be268d7
[ 2398.896674] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 000000000000000a
[ 2398.896685] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2398.896696] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000008
[ 2398.896707] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2398.896739]
21:26:22 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 99)
[ 2399.024230] loop4: detected capacity change from 0 to 215922
[ 2399.025050] loop5: detected capacity change from 0 to 264192
[ 2399.051743] loop2: detected capacity change from 0 to 215922
21:26:22 executing program 7:
syz_read_part_table(0x696e5b3, 0x7, 0x0)
[ 2399.090941] loop2: detected capacity change from 0 to 215922
[ 2399.172049] loop6: detected capacity change from 0 to 215922
[ 2399.190412] FAULT_INJECTION: forcing a failure.
[ 2399.190412] name failslab, interval 1, probability 0, space 0, times 0
[ 2399.190439] CPU: 1 PID: 10140 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2399.190458] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2399.190471] Call Trace:
[ 2399.190476]
[ 2399.190484] dump_stack_lvl+0x8b/0xb3
[ 2399.190511] should_fail.cold+0x5/0xa
[ 2399.190528] ? skb_clone+0x170/0x3c0
[ 2399.190556] should_failslab+0x5/0x10
[ 2399.190580] kmem_cache_alloc+0x5b/0x480
[ 2399.190615] skb_clone+0x170/0x3c0
[ 2399.190643] netlink_broadcast+0x9b1/0xd70
[ 2399.190681] ? alloc_uevent_skb+0x1c2/0x210
[ 2399.190708] kobject_uevent_env+0xa6b/0xfa0
[ 2399.190734] ? kernfs_put+0x42/0x50
[ 2399.190789] __loop_clr_fd+0x2f8/0x8b0
[ 2399.190818] lo_ioctl+0x632/0x1990
[ 2399.190842] ? vfs_fstatat+0x97/0xb0
[ 2399.190873] ? loop_set_status_old+0x1b0/0x1b0
[ 2399.190894] ? avc_ss_reset+0x180/0x180
[ 2399.190942] ? __lock_acquire+0xbac/0x6120
[ 2399.190984] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2399.191013] ? lock_is_held_type+0xd7/0x130
[ 2399.191038] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2399.191068] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[ 2399.191093] ? do_vfs_ioctl+0x132/0x1610
[ 2399.191121] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2399.191152] ? blkdev_common_ioctl+0x1ad/0x1990
[ 2399.191172] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400
[ 2399.191199] ? blkdev_bszset+0x1f0/0x1f0
[ 2399.191220] ? selinux_inode_getsecctx+0x90/0x90
[ 2399.191251] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2399.191283] ? __ia32_sys_stat+0x70/0x70
[ 2399.191315] ? loop_set_status_old+0x1b0/0x1b0
[ 2399.191344] blkdev_ioctl+0x356/0x7f0
[ 2399.191363] ? blkdev_common_ioctl+0x1990/0x1990
[ 2399.191385] ? selinux_file_ioctl+0xb1/0x260
[ 2399.191412] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2399.191438] ? blkdev_common_ioctl+0x1990/0x1990
[ 2399.191459] __x64_sys_ioctl+0x196/0x210
[ 2399.191490] do_syscall_64+0x3b/0x90
[ 2399.191511] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2399.191535] RIP: 0033:0x7f5b6be268d7
[ 2399.191549] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2399.191566] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 2399.191583] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be268d7
[ 2399.191595] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 000000000000000b
[ 2399.191607] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2399.191619] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000008
[ 2399.191630] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2399.191666]
21:26:37 executing program 5:
syz_read_part_table(0x700000000000000, 0x0, 0x0)
21:26:37 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:26:37 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0) (fail_nth: 100)
21:26:37 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x5460, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:37 executing program 7:
syz_read_part_table(0x696e5b3, 0x8, 0x0)
21:26:37 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x40087602, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:37 executing program 3:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00')
pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000000)='5', 0x1}], 0x300, 0x0, 0x0)
r2 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000013c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="ff843f0000fd5700e35dbe96c788df20"])
sendmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000001200)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @empty}, 0x2, 0x7, 0x4}}, 0x80, &(0x7f0000001380)=[{&(0x7f0000001180)="b8b9f3e0e3e8c9cae525f4b929f45026b2b2e194629670e141cbb2fd556171f4e41b49f858cf3730d3f46bcbaac2ded4262101d9390602824b9afb", 0x3b}, {&(0x7f0000001280)="6a790a625c449068632a18e620cddc4eb9a50d63070d3f585d7f30d7021392b516866824a8d82b9ae6327a7be79e9dfbeb16d7c4ba1875e2b0fdd15e1cc2b474f7e2f40b12de0299fc3187ac03f2545a3656400d979dc0fa48510c257ac6c1e6a40acf0cda207c19193ebd5920593fd130154ff4c6a26b8a19f28e2dcc82b1f5dfb9a6afcd1b4c03938fb5bbfaef8be0bfb44e4fc96c93d8ec32b8abbf0bc0556e36949352f6b15d2449418a161db22c35a81178e2a1083dd78355b1097ac930dabb5941f11a256d012d0b916f03486531d690ec9abedc81f01b7a813fbc85685a24bdc430ad6b4edef717c5833571", 0xef}], 0x2, &(0x7f0000001500)=[{0xf0, 0x1, 0x40, "f93710385a2735b0591b49e5e7a44d40b0f82c43871b8505d244aea19de14b18064ba7141ce7e0030073962f31660127bce0ab58d9fd5693a3baa857a1623ac83bad5fa19aebed850bdc376e6e1eecfca6be2bbba813f228bce602e7b8fbabf07412cdf4a15efdfb05ffd53c515ce79b1db9d8192047d0ff9b2baf79f922c29d8a9f8e668c2fcd01678628f816fb03ce0ff28ee96b83a2ba1b2ef6e14ddf0aff6c088359f2852bb98cd3a754c69567ccb52919390745feda391f9cf07129f911bb748356c0e22c91eb2363583d48414fabc7434b61107b443d6f28a402f0"}, {0xd0, 0x119, 0x8, "02b6ef625eb3404b0822647482c0cc6d5dd84ddeca607f2e33721299fc83c3a576119fe62e71fd9bb1e795c5c5c888518da932b048066033e4fc7bfb68ed9c0f93c6919b740c56715ac6fd7c43997155d8fbe46456892ed5907322f6af62daea7c4c0c2de48a198285c39cc5268c0d5e83086992daeb1037361e0557839120101acdd8c9883e2db7da58a86b3d53637e061354707a51333f413dc820fc99825e2af5e0c0609975b5662b464843e31784f95733bdb74307d482f4"}, {0xe8, 0x117, 0x5, "5f59a25ec4668a22ebb4d424b479405b29b25a33e945e2657af4535e5a4a928338e2ec8ad24a8784981b0416f2850acbf2458a81eafa2f2cc748d0ffde5ffde0dd41c47dafdbead31666e53573ae75fb23b32277df9c745b25e0e415afe8ee6b91f6952740ab55b3a13a5a46fb271a19b05e4cb9f4f3d8afeb33c9b65d1f1936f9ae3837c4d19639d8eadeb88a14064e20dd677a2e1ef6abe79178696c9d7f1ad6330863435c79368725cc2115316deb271c9b52dcacf84c1e42d6f2462755aa42d21853bf51a30a2ac83fc1adfc18f1cf"}, {0x100, 0x10f, 0x7, "93b06d147c2c5afc8c183f945cc3b641daff8c2fa9fb0ef8174f5118cc531f1b85f218432f63766fc27d96e6a61f8b56ff187a3941457126960022648528eb8a10761161dc79e28a73533115e101a6a4cd577c0d2f0ed8705216021888eb1f44fd2ded89d9dbe5d373ec6e9de947f63eb24cbd6afd4ce5c41d703506a45fe90d3afb091542b14dcd5b7e259a4f94457dd586d9e1ff26057aebe822d8e69ec59eb383436869c577a2971a056e1ced5a5b6eb94e71793ac210c4592b542433daa5e16e7977640161286f9d9392796bb3ffd641b97c497a55623bd655f576ba4acb4232b5189c5c25b74d39"}, {0xc8, 0x112, 0x400, "a306fc503a4d0cf7c6d7d3873f978dfd26454008d03e7b46dd05c28e94d16b065a308cff3b3543be9ea1be260cba143415917edbec163f59617e9e8d5cab1d1b74ada5e082ed69373f9b70ccf143c180732801eea88ea1d98c699124cb81db2dad22cbb11c51127a8404cec2383d6ec9838dd67d5c4a5b6c02a33d5460aa411de2b956686ad0423d5f57bd3f9e8ec957ef448884fa58f259340ec1b33c653ff40b80b7a0608b1544e7a4d71f185c19e212"}, {0xa0, 0x29, 0x1000, "0f5bae4ff88c9249313664bd5939ceb62e4fbafe40c0a044ff6b8a190f188fe4749b1823d8080b11eeb8594fc9aebe30240d3f0f7ca2e72b0897b11491c6694dcfc8fba9deac4011215df2de5df183b6afd24de9dbcacee77425f6d57e62e78e8db76a64a1735fff7c250dbf4672600daea79f0ebd73e97972bd698ac0b6f094f7e130cf676d2bd43835812f54c4"}], 0x510}}, {{&(0x7f0000001400)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e20, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x457f}}}, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001a40)="5e703778e0d43b7e8644abe87f80dde34584d21518de217f7fd4e8b6428cbce8b5fb532c486af25265a64f4ef8919045a1087dc267ea4082c3e5fa3033782da36fa6f738b47b347f1cb0f5a6e85f5498530b21a42625e8e57e572da66183fed62550879f304b13bafa65c4bf11a75c4fc8150ad2b6943f9d40f9b2ae2d0eb84e4c163ff42fea945dae34f6230ba7009bb6ecdb5f", 0x94}, {&(0x7f0000001b00)="93d43e07f278e7d90c95882cdc5729fc014a93c8dfef2c0734", 0x19}, {&(0x7f0000001b40)="08315306e81da0e09d934ddc1593f13e9e81b892f63119a7449085dd094a88870472e039daa7bdcc01a39bd75786aeafcfa44d0866b63876408937b46a7a85101405164e0d3f77c93ed68200f82515f201b5ac82653185b9d9b8492f68042b617a3a6147637f75ed398958", 0x6b}, {&(0x7f0000001bc0)="694f53f0468b434b31f13ac8bc10c0b77733919a11ee7f29e3039aa964943483f569270384ccfad82b4fcb7271d88461af4486020c6b7908a0aa4d994193625a064886e41a31699d1fb7b8bca66ba2ae4469e4b9125ea30730d56a31134b38df00a3192d65e3382ad243e3e592cc11881acd6e43ea", 0x75}, {&(0x7f0000001c40)="4e78f58e96c010b445d150fb0ab2f19be050f5aad237a3bb53b851ea96", 0x1d}, {&(0x7f0000001c80)="32bfd176a04199fb37403ad12cfce5955db101fb862b3a0717a7ed71cea16dc1ff001b6a875b5c6b321615bcdd45da4e07bc4827b05b1ec9e6bb5d77435cc6d9a0b1e9fdf3c274206a1a07f636e6b57b6b4c027458b254bdebf9f9f0a6e04bd2290947f1eac030b17111438ecfc8fc5f429d4233db1c2b6273a29701266fc57e56776a4f91786fc5116815ca17d38a5d51792c3924ec1ccad98df935bb117131c47a60", 0xa3}], 0x6}}, {{&(0x7f0000001dc0)=@nl=@kern={0x10, 0x0, 0x0, 0x10000}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001e40)="892acd7725d8e72c1c6165059ab13d85d5fa44788e209e0271b14eab65c349577fcefcc258ec415dc30b036ee7a71d2502765c12353cb87f5381ea7869058513f56154e32f131cd5eaf775e3f03048c886b178a9a85cf343f3e89cfd5133df67f2d079d3ef09ae0509f7ce10c93dde470cde10b4d47850460bd7d7062c50a2b7230cc36b231249479209a3d570191855f9343000bdf0a6f5c312877445a75aa17fa11505278f688c734b5bfd1f03555b09df4f50", 0xb4}, {&(0x7f0000001f00)="fb8a7ab1829d11647a6e9acccff40ab938768323c7a96fb92c4340de0b32a2d9114347e4098c26fef59601a104fcf3f5d5266e2c1825130126904fae391d1132bcdb43a6b8", 0x45}], 0x2}}, {{&(0x7f0000001fc0)=@sco={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000002040)="abed1282dabf9a4237800ca7f149e5e32ec09eb655384697d1930cc33d2b8ea74cf1283290f6dce2aa84c78fd068bfd36cf175e8349696ebfc05568e55f272a62f608fa3e845891a645ccf12a74c8d5000804258e34b56a15c28adfbfba15864b4d223e3c40ccf", 0x67}, {&(0x7f00000020c0)="375db249f410222af171ddc55d921eb54fc1c1da499f1badb1a2847bd7581a", 0x1f}, {&(0x7f0000002100)="55c70cf9694aa40668a378445e46aea9bfeee8", 0x13}, {&(0x7f0000002140)="f642579e23c6a8c7447758e2b460065d04667b8b755dede9fb4953f05e116496d922272b5f3dcf4d326169a2f77776756bf03929fb89956fba8a41d066c6afde94f563791c5e0fdd1da512cda07e4d2904a7608ddafd2bb6cce98604f46c00328f1e6a1c5a7c739aa1314e9f024c04ee21ed9f", 0x73}], 0x4}}], 0x4, 0x8004)
r4 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f00000000c0)={'macvlan1\x00', 0x401})
ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:37 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0)
read$rfkill(r2, &(0x7f0000000540), 0x8)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000440)={0x0, 0x0})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14000000000000f720001e6e01000000", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0)
perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x81, 0x1, 0x7, 0x7f, 0x0, 0x8, 0x80400, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x100000000}, 0x80, 0x1, 0x0, 0x7, 0xffff, 0x2, 0x1, 0x0, 0x5, 0x0, 0x4}, r4, 0xb, r6, 0x0)
ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f00000004c0)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e24, @private=0xa010100}, 0x312, 0x0, 0x0, 0x0, 0xff01, &(0x7f00000000c0)='netdevsim0\x00', 0x5, 0x4, 0x3})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2414.034417] loop5: detected capacity change from 0 to 264192
[ 2414.089198] loop6: detected capacity change from 0 to 215922
[ 2414.092461] loop5: detected capacity change from 0 to 264192
[ 2414.099765] FAULT_INJECTION: forcing a failure.
[ 2414.099765] name failslab, interval 1, probability 0, space 0, times 0
[ 2414.099797] CPU: 1 PID: 10159 Comm: syz-executor.6 Not tainted 5.18.0-rc5-next-20220502 #1
[ 2414.099821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 2414.099837] Call Trace:
[ 2414.099843]
[ 2414.099851] dump_stack_lvl+0x8b/0xb3
[ 2414.099884] should_fail.cold+0x5/0xa
[ 2414.099907] ? skb_clone+0x170/0x3c0
[ 2414.099938] should_failslab+0x5/0x10
[ 2414.099968] kmem_cache_alloc+0x5b/0x480
[ 2414.100011] skb_clone+0x170/0x3c0
[ 2414.100046] netlink_broadcast+0x9b1/0xd70
[ 2414.100091] ? alloc_uevent_skb+0x1c2/0x210
[ 2414.100124] kobject_uevent_env+0xa6b/0xfa0
[ 2414.100156] ? kernfs_put+0x42/0x50
[ 2414.100200] __loop_clr_fd+0x2f8/0x8b0
[ 2414.100235] lo_ioctl+0x632/0x1990
[ 2414.100265] ? vfs_fstatat+0x97/0xb0
[ 2414.100305] ? loop_set_status_old+0x1b0/0x1b0
[ 2414.100333] ? avc_ss_reset+0x180/0x180
[ 2414.100389] ? __lock_acquire+0xbac/0x6120
[ 2414.100439] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 2414.100474] ? lock_is_held_type+0xd7/0x130
[ 2414.100503] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2414.100540] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[ 2414.100575] ? do_vfs_ioctl+0x132/0x1610
[ 2414.100610] ? __sanitizer_cov_trace_switch+0x63/0xf0
[ 2414.100647] ? blkdev_common_ioctl+0x1ad/0x1990
[ 2414.100671] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400
21:26:37 executing program 7:
syz_read_part_table(0x696e5b3, 0x9, 0x0)
[ 2414.100706] ? blkdev_bszset+0x1f0/0x1f0
[ 2414.100729] ? selinux_inode_getsecctx+0x90/0x90
[ 2414.100766] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2414.100804] ? __ia32_sys_stat+0x70/0x70
[ 2414.100840] ? loop_set_status_old+0x1b0/0x1b0
[ 2414.100874] blkdev_ioctl+0x356/0x7f0
[ 2414.100896] ? blkdev_common_ioctl+0x1990/0x1990
[ 2414.100918] ? selinux_file_ioctl+0xb1/0x260
[ 2414.100956] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 2414.100990] ? blkdev_common_ioctl+0x1990/0x1990
[ 2414.101018] __x64_sys_ioctl+0x196/0x210
[ 2414.101057] do_syscall_64+0x3b/0x90
[ 2414.101083] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2414.101113] RIP: 0033:0x7f5b6be268d7
[ 2414.101130] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2414.101152] RSP: 002b:00007f5b6939bef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 2414.101173] RAX: ffffffffffffffda RBX: 00007f5b6939bf40 RCX: 00007f5b6be268d7
[ 2414.101188] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 000000000000000b
21:26:37 executing program 5:
syz_read_part_table(0x1200000000000000, 0x0, 0x0)
21:26:37 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2414.101201] RBP: 00007f5b6939c6bc R08: 0000000000000001 R09: 00007f5b6939bd90
[ 2414.101215] R10: 00007f5b6939bc47 R11: 0000000000000246 R12: 0000000000000008
[ 2414.101229] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5b6939bf80
[ 2414.101268]
[ 2414.110382] loop2: detected capacity change from 0 to 215922
21:26:37 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x401c5820, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2414.129017] loop4: detected capacity change from 0 to 215922
[ 2414.149704] 9pnet_fd: p9_fd_create_tcp (10162): problem connecting socket to 127.0.0.1
[ 2414.154236] loop2: detected capacity change from 0 to 215922
[ 2414.283980] loop5: detected capacity change from 0 to 264192
[ 2414.302403] loop5: detected capacity change from 0 to 264192
[ 2414.411302] loop6: detected capacity change from 0 to 215922
[ 2414.451439] loop4: detected capacity change from 0 to 215922
[ 2414.494167] loop4: detected capacity change from 0 to 215922
21:26:54 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f00000000c0)={0x2, 0x7bf39ecc, 0x1ff, 0x0, 0x3f})
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:54 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:26:54 executing program 5:
syz_read_part_table(0x2000000000000000, 0x0, 0x0)
21:26:54 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x4020940d, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:54 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0xffffffffffffffff, r0, 0xb)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
r5 = socket$packet(0x11, 0x2, 0x300)
ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0})
r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_RINGS_SET(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x28, r7, 0xd0b, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX={0x8}, @ETHTOOL_A_RINGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x28}}, 0x0)
setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f00000003c0)={@broadcast, @broadcast, r6}, 0xc)
socket$inet_udp(0x2, 0x2, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:54 executing program 7:
syz_read_part_table(0x696e5b3, 0xa, 0x0)
21:26:54 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x2, 0x0)
21:26:54 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x40049409, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:54 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x3, 0x0)
[ 2431.356004] loop4: detected capacity change from 0 to 215922
21:26:55 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x4, 0x0)
[ 2431.366938] loop5: detected capacity change from 0 to 264192
[ 2431.380448] loop5: detected capacity change from 0 to 264192
[ 2431.388723] 9pnet_fd: p9_fd_create_tcp (10198): problem connecting socket to 127.0.0.1
[ 2431.399883] loop2: detected capacity change from 0 to 215922
21:26:55 executing program 7:
syz_read_part_table(0x696e5b3, 0xd, 0x0)
21:26:55 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @local}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
r6 = clone3(&(0x7f0000004c00)={0xc0000500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
capset(&(0x7f0000000000)={0x20080522, r6}, &(0x7f0000000040)={0xfffffff9, 0xe385, 0x200, 0x9, 0x80000, 0x7f})
perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x5, 0x8, 0xc7, 0x9, 0x0, 0x1, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x10001, 0x20000000}, 0x80, 0x29b, 0x6, 0x9, 0x0, 0x6, 0x200, 0x0, 0x8000, 0x0, 0x4}, r6, 0xa, 0xffffffffffffffff, 0xa)
sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0)
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r5, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, @in_args={0x4}}, './file0\x00'})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:55 executing program 5:
syz_read_part_table(0x2ccf95a600000000, 0x0, 0x0)
[ 2431.458171] loop2: detected capacity change from 0 to 215922
21:26:55 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x80086601, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2431.474980] loop5: detected capacity change from 0 to 264192
[ 2431.493667] loop5: detected capacity change from 0 to 264192
21:26:55 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0))
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:26:55 executing program 5:
syz_read_part_table(0x3f00000000000000, 0x0, 0x0)
21:26:55 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x5, 0x0)
21:26:55 executing program 7:
syz_read_part_table(0x696e5b3, 0xf, 0x0)
[ 2431.585223] loop5: detected capacity change from 0 to 264192
[ 2431.600619] loop5: detected capacity change from 0 to 264192
[ 2431.636051] loop4: detected capacity change from 0 to 215922
[ 2431.673170] loop4: detected capacity change from 0 to 215922
21:27:13 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x80087601, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:27:13 executing program 7:
syz_read_part_table(0x696e5b3, 0x11, 0x0)
21:27:13 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="010000000001"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:27:13 executing program 5:
syz_read_part_table(0x4800000000000000, 0x0, 0x0)
21:27:13 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
r2 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000440)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'})
perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0xe8, 0xbe, 0x5, 0x0, 0x1000, 0x84010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x16b3e075, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x40002, 0x1f, 0x0, 0x9, 0x9, 0x1f, 0x3, 0x0, 0x6, 0x0, 0x7ff}, 0x0, 0xe, r5, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:27:13 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
r3 = socket(0x2a, 0x3, 0xfffeffff)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0})
sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, r5, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r6}, @void}}}, 0x1c}}, 0x0)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000a00)=@broute={'broute\x00', 0x20, 0x3, 0x53a, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000480), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x11, 0x11, 0x8917, 'lo\x00', 'erspan0\x00', 'team_slave_1\x00', 'veth1_to_hsr\x00', @multicast, [0x0, 0x0, 0x0, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3c}, [0xff, 0x71b125de0e3f046f, 0xff], 0x6e, 0x6e, 0x9e, [], [], @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x4}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{0x9, 0x10, 0xfbfb, 'veth1_to_bridge\x00', 'veth1_macvtap\x00', 'nr0\x00', 'vxcan1\x00', @remote, [0x0, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff, 0xff], 0xbe, 0x236, 0x26e, [@ipvs={{'ipvs\x00', 0x0, 0x28}, {{@ipv4=@empty, [0x0, 0xffffffff, 0xffffffff], 0x4e20, 0x5e, 0x2, 0xfff9, 0x20, 0x10}}}], [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0xfdc2, 'system_u:object_r:boot_t:s0\x00'}}}, @common=@ERROR={'ERROR\x00', 0x20, {"8000d148724a6e794d9a3f3e98d1c3f125cfcfdaf46505dbaf4ff20f73cf"}}], @common=@dnat={'dnat\x00', 0x10, {{@random="b8f35c91273a"}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0x3, 0x2, 0x8884, 'dummy0\x00', 'veth1_to_team\x00', 'sit0\x00', 'veth1_virt_wifi\x00', @multicast, [0xff, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x27}, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], 0x9e, 0x166, 0x19e, [@cgroup0={{'cgroup\x00', 0x0, 0x8}, {{0x7, 0x1}}}], [@common=@nflog={'nflog\x00', 0x50, {{0x3ff, 0x5, 0x4, 0x0, 0x0, "70e8a24510d098d835dfa8c583782a5a8b33b0b13fb3edfd3581348eca49592f7d98f89e432d5325030208b386f28a646e6bae12e22fa89d5bf4163d43266b0b"}}}, @common=@log={'log\x00', 0x28, {{0x40, "3e255a49e190c307f1061b2a4c8c4cd524ee6e68a4eebb1f1622d4c2055b", 0x5}}}], @common=@mark={'mark\x00', 0x10, {{0xffffffc0, 0xfffffffffffffffc}}}}]}]}, 0x5b2)
sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r3, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, 0x0, 0x910, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x0, 0x2d}}}}, [@NL80211_ATTR_MAC={0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0xd1)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:27:13 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x6, 0x0)
21:27:13 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x40086602, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2450.358855] loop5: detected capacity change from 0 to 264192
[ 2450.418779] loop2: detected capacity change from 0 to 215922
[ 2450.423616] 9pnet_fd: p9_fd_create_tcp (10256): problem connecting socket to 127.0.0.1
[ 2450.428923] loop4: detected capacity change from 0 to 215922
[ 2450.458003] loop2: detected capacity change from 0 to 215922
21:27:14 executing program 7:
syz_read_part_table(0x696e5b3, 0x12, 0x0)
[ 2450.472032] loop5: detected capacity change from 0 to 264192
21:27:14 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f00000000c0)=0x4)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:27:14 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x40087602, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:27:14 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x801c581f, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2450.703402] loop4: detected capacity change from 0 to 215922
[ 2450.716863] loop2: detected capacity change from 0 to 215922
21:27:14 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x7, 0x0)
21:27:14 executing program 5:
syz_read_part_table(0x4c00000000000000, 0x0, 0x0)
21:27:14 executing program 7:
syz_read_part_table(0x696e5b3, 0x48, 0x0)
21:27:14 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x800001f, 0x0, 0x0)
[ 2450.797942] loop5: detected capacity change from 0 to 264192
[ 2450.817798] loop5: detected capacity change from 0 to 264192
21:27:31 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:27:31 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="010000000001"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:27:31 executing program 5:
syz_read_part_table(0x6800000000000000, 0x0, 0x0)
21:27:31 executing program 7:
syz_read_part_table(0x696e5b3, 0x4c, 0x0)
21:27:31 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x401c5820, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:27:31 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_open_dev$ptys(0xc, 0x3, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e20, @dev}, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast1}, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x1000)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x5, 0x5}}, './file0\x00'})
recvmsg$unix(r4, &(0x7f0000000640)={&(0x7f0000000400)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000480)=""/96, 0x60}, {&(0x7f0000000500)=""/183, 0xb7}], 0x2, &(0x7f0000000600)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x22000)
21:27:31 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x8, 0x0)
21:27:31 executing program 0:
ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000b40)={0x0, 0xfffffffffffffffb, 0xe5, 0x0, @scatter={0xa, 0x0, &(0x7f00000008c0)=[{&(0x7f00000003c0)=""/174, 0xae}, {&(0x7f0000000480)=""/81, 0x51}, {&(0x7f0000000500)=""/155, 0x9b}, {&(0x7f00000005c0)=""/93, 0x5d}, {&(0x7f0000000640)=""/110, 0x6e}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f00000000c0)=""/33, 0x21}, {&(0x7f0000000780)}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/225, 0xe1}]}, &(0x7f0000000980)="ebbc9b5d9f04fba4e50de20f8778c81a1fa7e5aec94a4d4f445b0eef0b07260799cbb72b8913d7b59d5759ef5028544fa69ad64d18aadc50ce5441d4caa565f323007025b42b1218ee99ce1b2ebc716f0478d91a692fe259ea99c193fa6c90305b15beb1ef2766eea122f3e8e54fd47c48c7e064289e5887475cdcc726c05cd058cfc80e33a095ce11011442db2abc921367d52a9524a10cca19d99c7f0876d363fdaca9926230d3e523c84918932aba7e0eef821fadba53d6d2a1859826ce53280f5d67b1ec6f28aa133b44d135f4930fef0494a4875a8b7cc9584c59620d88c3d676e5e4", &(0x7f0000000a80)=""/115, 0x8, 0x10000, 0x0, &(0x7f0000000b00)})
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2468.047638] loop5: detected capacity change from 0 to 264192
[ 2468.059352] loop5: detected capacity change from 0 to 264192
[ 2468.067839] loop2: detected capacity change from 0 to 215922
21:27:31 executing program 7:
syz_read_part_table(0x696e5b3, 0x55, 0x0)
[ 2468.143604] loop4: detected capacity change from 0 to 215922
[ 2468.150923] 9pnet_fd: p9_fd_create_tcp (10310): problem connecting socket to 127.0.0.1
21:27:31 executing program 5:
syz_read_part_table(0x6c00000000000000, 0x0, 0x0)
[ 2468.168969] loop2: detected capacity change from 0 to 215922
[ 2468.201859] loop4: detected capacity change from 0 to 215922
21:27:31 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x4020940d, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:27:31 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x9, 0x0)
21:27:31 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4, @ANYBLOB="c6000600"], 0x18}, 0x0)
ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f00000000c0)=0x5)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
r5 = socket$inet6(0xa, 0x6, 0x1876)
r6 = getpgrp(0xffffffffffffffff)
newfstatat(0xffffffffffffff9c, &(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000)
sendmsg$unix(r3, &(0x7f0000000e00)={&(0x7f00000004c0)=@abs={0x62c033b897e44423, 0x0, 0x4e22}, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000540)="a0739bd3fac2ce5eef6eec74f230f625a795e7cb1f082a80e82d640057543b943a3df432799a958688b637b7b40c1500acbebd79ca19fb41b8e2ac64b2eb1c9adda140cf5a4597be01084b65891efbf6a3bd4afda4b6b108ca22d6258de96ef988a723c965a379262d31f8db6d34644f3ce7854e1aa763e5b7042c6d97b2fb29b3937480a1700a00bd118d2a1f10956dadc7201cda8c15f08dbf49bd3cc7d5c9", 0xa0}, {&(0x7f0000000600)="cdaba26343c1ac36f04b8a7f9592dc6f50fcaafe36dcc4618e014f99e8dfedcddb78eba1", 0x24}, {&(0x7f0000000640)="3a656a106334f693757b8fd48fcc88b0bb478f76ab2e956eaa6a5cf067c3294122", 0x21}, {&(0x7f0000000680)="bc7c07597e7037d38de14cf4d5d451a5fee71f7812eabaa34ddf523334c4dc178442d36b3dd233", 0x27}, {&(0x7f00000006c0)="6cd867b6caeeecfd4d2ba7f7b0a26ea5349435b336534b9f956e8cf69f948a5dde15", 0x22}, {&(0x7f0000000700)="bed2932d519ed1a354512fe5ce83728fdef3f6bd2dde579d5a7ea2b47c71628d22c2745628de0a684340b3eeacfd0ec79c4ed74afbe09514b509988066623c109ad355ba530b874b98d5d3f11e5cfc658eb1a4a1377b6dae608d7b1424498a207fcf48636bc667c8232f5e279c7167", 0x6f}, {&(0x7f0000000780)="e68c675d9753c2b34ffd4978bd960125bd4688e59d1a5f851a8fe86447f67666ce92bd5f480b2037fe66d387242cfd1f0385e42768c298e3ebcea71f8a99d194bec4c821ceda5a443d3e89025cf3f2cd7f05c5dd0cba6bc759eee844506ad828a7791976ea67d0d25f285b53b8861c1e7f947bc112d953afd95427a33e781bb403236a7f804c95a449c82ec4a99b220de6b7319efa833451dabe182ba367c1029645920a560d2cd01759dfeb4aa93d7e946a5901d91a6bb86d11a1f1639284", 0xbf}], 0x7, &(0x7f00000008c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r4, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r5, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c0000fb00000000000100001902000000d5aae810e069558067c027bba0c11c4446d9cdecd0d2d967389c07f63ce4b22a7135f625c8bdfb3d2cff5d903065dad64d9e249ce15cdceb053b6bbb7418488ea460", @ANYRES32, @ANYRES32, @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00'], 0x90, 0x4040}, 0x40000)
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0xe302}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
getsockopt$inet_buf(r4, 0x0, 0x2e, &(0x7f0000000400)=""/84, &(0x7f0000000480)=0x54)
21:27:31 executing program 7:
syz_read_part_table(0x696e5b3, 0x68, 0x0)
21:27:31 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2468.330684] audit: type=1400 audit(1652131651.972:11): avc: denied { create } for pid=10324 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1
21:27:32 executing program 5:
syz_read_part_table(0x7400000000000000, 0x0, 0x0)
[ 2468.398023] loop4: detected capacity change from 0 to 215922
[ 2468.404061] loop2: detected capacity change from 0 to 215922
[ 2468.429242] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[ 2468.429275] Buffer I/O error on dev loop2, logical block 0, async page read
[ 2468.429346] loop2: unable to read partition table
21:27:32 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x80)
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)={0x5, 0xff, 0x5, 0x5925})
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2468.429451] loop2: partition table beyond EOD, truncated
[ 2468.466852] loop2: detected capacity change from 0 to 215922
[ 2468.478468] loop5: detected capacity change from 0 to 264192
[ 2468.530991] loop5: detected capacity change from 0 to 264192
21:27:45 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="010000000001"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:27:45 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xa, 0x0)
21:27:45 executing program 0:
getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x42, &(0x7f00000000c0), &(0x7f00000003c0)=0x10)
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000440))
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='/dev/vcsa#\x00')
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f0000000480))
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:27:45 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0189436, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:27:45 executing program 3:
syz_open_dev$vcsa(&(0x7f00000000c0), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000180)={0xfffffffb, 0x3, 0x7fff, 0x2, 0x9, "0dfb13f5f39c4c7edbc7069a66caceaba4ecfd"})
21:27:45 executing program 7:
syz_read_part_table(0x696e5b3, 0x6c, 0x0)
21:27:45 executing program 5:
syz_read_part_table(0x7a00000000000000, 0x0, 0x0)
21:27:45 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x80086601, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2482.108345] loop5: detected capacity change from 0 to 264192
[ 2482.144671] loop2: detected capacity change from 0 to 215922
[ 2482.150650] loop5: detected capacity change from 0 to 264192
[ 2482.153030] 9pnet_fd: p9_fd_create_tcp (10363): problem connecting socket to 127.0.0.1
[ 2482.162422] loop4: detected capacity change from 0 to 215922
21:27:45 executing program 7:
syz_read_part_table(0x696e5b3, 0x74, 0x0)
[ 2482.196574] loop2: detected capacity change from 0 to 215922
[ 2482.199795] loop4: detected capacity change from 0 to 215922
21:27:45 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xd, 0x0)
21:27:45 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1a)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:27:45 executing program 5:
syz_read_part_table(0x97ffffff00000000, 0x0, 0x0)
21:27:45 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc020660b, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:27:45 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x80087601, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2482.350173] loop4: detected capacity change from 0 to 215922
21:27:46 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000000c0)={0xffffffffffffffff, 0x7, 0x3ff, 0x54})
openat(r2, &(0x7f00000003c0)='./file0\x00', 0x10440, 0x44)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/keys\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x5, 0x1e, 0x60, 0x5, 0x0, 0x430, 0x85, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x61, 0x1, @perf_bp={&(0x7f0000000400)}, 0x80400, 0x3, 0x7, 0x2, 0xffffffffffffffff, 0x1b, 0x1f, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8)
[ 2482.425256] loop5: detected capacity change from 0 to 264192
21:27:46 executing program 7:
syz_read_part_table(0x696e5b3, 0x7a, 0x0)
[ 2482.486489] loop2: detected capacity change from 0 to 215922
[ 2482.559053] loop2: detected capacity change from 0 to 215922
21:28:04 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="010000000001000000"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:28:04 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x81, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x40, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)={0x0, @aes256, 0x0, @desc1})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:04 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0x801c581f, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:04 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000004, 0x20010, r0, 0x6)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r6]}}], 0x18}, 0x0)
io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[r2, r1, r4, r5], 0x4)
21:28:04 executing program 7:
syz_read_part_table(0x696e5b3, 0x90, 0x0)
21:28:04 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481223, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:04 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xf, 0x0)
21:28:04 executing program 5:
syz_read_part_table(0xf6ffffff00000000, 0x0, 0x0)
[ 2500.658399] loop5: detected capacity change from 0 to 264192
[ 2500.661065] loop2: detected capacity change from 0 to 215922
21:28:04 executing program 7:
syz_read_part_table(0x696e5b3, 0xf0, 0x0)
[ 2500.689926] loop5: detected capacity change from 0 to 264192
[ 2500.702688] 9pnet_fd: p9_fd_create_tcp (10415): problem connecting socket to 127.0.0.1
[ 2500.721920] loop2: detected capacity change from 0 to 215922
[ 2500.740092] loop4: detected capacity change from 0 to 215922
21:28:04 executing program 5:
syz_read_part_table(0xfcfdffff00000000, 0x0, 0x0)
21:28:04 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = socket$nl_route(0x10, 0x3, 0x0)
syz_mount_image$vfat(&(0x7f0000000500), &(0x7f0000000540)='./file0\x00', 0x10001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000580)="fe7013405b443ccab61d44dcbe2bd383bec7b60c6e5338dee9224c142286fba013913a020b0aee7247ac3e9a3b2a8a6cf766664c5eb35a8d91afd7bb53bd55433dcf888fd4d600d5a881e972149f53a2953fd152596c2fbd617f05352a8f520bf5a19dfe4fa6a8c6779d6c88f8cdb3c303e9e88e17817118de21c2cc749971d7f773ce764d7f52b55b85f0e757d5d78ba8a57f44b1718aa4bacc31c20116ee557935ec6b1e111fa2ef", 0xa9, 0x400}, {&(0x7f0000000640)="aa0b8845eee8c234f4655a74cd2da3540f085f0b90bd523aac089d4b777b84973e6d97bc1407deb9e26f5c8f640b9de901bbdf01b620d61279edf7261ef136a96bb887dc1ad30a910eb59bc4a2fb63932dba5881f2e61ce26255e08a15b234577c15fa7916fac671acbe62facfd6cf38043fd673db7cfc76b849a2382e1fcdd20fb42e6fe15dc65cdc66cecb6a67fd54836ddb6c1032713991d36e37c8be940c47e34f665cdcc2b98a5ecc996a9dd62207a71590c2", 0xb5, 0x1}, {&(0x7f0000000700)="033033048fff3b5b7ea27d8b7ca29e871e1c47d711199039e75ae48a8280dcc6fffa9eebe381a929dbd0542e4c1d0305cc555d60c1865251c9e85853675e558d5aec89c6d7ef24c1391660d75313623a66960a53b8b784c9ae9cb271c1719b2ff3fc478b80e64ecb7087650152794b7d0cd39aade39a34270771400be2f5bf294c02d74c3f07f74adb2219d7c566ee588288dcce1c966ad60793fa1ea41fc43306ec6b23978238ec35f31ec98feaab4284783ed04bbd0f781ba6311fdb", 0xbd, 0x8}], 0x800040, &(0x7f0000000840)={[{@rodir}, {@uni_xlate}], [{@uid_gt={'uid>', 0xee00}}]})
setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r4 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f00000004c0)=0x0)
perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x88, 0xc7, 0xc1, 0x0, 0x8, 0x200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x0, 0x400}, 0x5008, 0x10001, 0xfff, 0x2, 0x9, 0x80000000, 0x20, 0x0, 0x14, 0x0, 0x5}, r5, 0xa, 0xffffffffffffffff, 0x1)
perf_event_open$cgroup(&(0x7f00000003c0)={0x6, 0x80, 0x8, 0x6, 0x3, 0x9, 0x0, 0x6, 0x6081, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0xc98866506df7a9e4, @perf_bp={&(0x7f00000000c0), 0xc}, 0x413c, 0xffffffffffffff3e, 0xffff, 0x5, 0x3f, 0x2, 0x1f, 0x0, 0x7, 0x0, 0x4}, r0, 0xd, r2, 0xa)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:04 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:04 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481225, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2500.851114] loop5: detected capacity change from 0 to 264192
21:28:04 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
sendto$inet6(r4, &(0x7f0000000480)="ea26335681a719e4ad67851c4c22ed0a9e17e50cda6dc9ee5d5d7d509e7be49eeef5f93ef4784f39561b76061f1f77fcfe40dd277219766bb1b7418eb0c3e76cd919df9f8f1c0a9374f5a536497371435dbc24dda1addeead8e13ed1857cfa39e66f1193c31d7c8dd3cb89fe859f6a5b935f27483890c46d563abedf18d9334c05ba20003df6030d385fa4ca2cd435b29d0c312a71f8d3dbd976dc0d4ab1202736b0f85870", 0xa5, 0x0, &(0x7f0000000540)={0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, '\x00', 0xf}, 0x3}, 0x1c)
sendmsg$NL80211_CMD_GET_SURVEY(r0, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @void}}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8025}, 0x10000000)
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:04 executing program 7:
syz_read_part_table(0x696e5b3, 0xfe, 0x0)
21:28:04 executing program 5:
syz_read_part_table(0xfdfdffff00000000, 0x0, 0x0)
[ 2500.941579] loop5: detected capacity change from 0 to 264192
[ 2500.942397] loop2: detected capacity change from 0 to 215922
[ 2500.957750] loop5: detected capacity change from 0 to 264192
[ 2500.991064] loop2: detected capacity change from 0 to 215922
[ 2500.992936] loop4: detected capacity change from 0 to 215922
21:28:21 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="010000000001000000"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:28:21 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048122a, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:21 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
r2 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
r4 = eventfd(0x9)
r5 = socket$inet6_udplite(0xa, 0x2, 0x88)
r6 = socket$inet6(0xa, 0x3, 0x7)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r7, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0)
ppoll(&(0x7f00000000c0)=[{r0, 0x9185}, {r4, 0x4001}, {r0, 0x2101}, {r2, 0x133c}, {r5, 0x6082}, {r6, 0x2002}, {r7}], 0x7, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000400)={[0x5]}, 0x8)
21:28:21 executing program 7:
syz_read_part_table(0x696e5b3, 0x300, 0x0)
21:28:21 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x40}}, './file0\x00'})
ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000003c0)={0xe4, "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"})
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:21 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:21 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x11, 0x0)
21:28:21 executing program 5:
syz_read_part_table(0xfdffffff00000000, 0x0, 0x0)
[ 2518.292834] loop2: detected capacity change from 0 to 215922
[ 2518.303881] loop4: detected capacity change from 0 to 215922
[ 2518.315970] loop5: detected capacity change from 0 to 264192
[ 2518.319037] 9pnet_fd: p9_fd_create_tcp (10464): problem connecting socket to 127.0.0.1
[ 2518.333409] loop5: detected capacity change from 0 to 264192
[ 2518.347185] loop2: detected capacity change from 0 to 215922
21:28:22 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x12, 0x0)
21:28:22 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r1, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0)
sendmsg$NL80211_CMD_EXTERNAL_AUTH(r2, 0xfffffffffffffffd, 0x4840)
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:22 executing program 5:
syz_read_part_table(0xfeffffffffffffff, 0x0, 0x0)
21:28:22 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0189436, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:22 executing program 7:
syz_read_part_table(0x696e5b3, 0x500, 0x0)
21:28:22 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048122b, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:22 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x48, 0x0)
21:28:22 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4, @ANYBLOB="02000000"], 0x18}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r6]}}], 0x18}, 0x0)
copy_file_range(r3, 0x0, r6, &(0x7f00000000c0), 0x1ff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2518.553058] loop5: detected capacity change from 0 to 264192
[ 2518.587114] loop2: detected capacity change from 0 to 215922
[ 2518.612396] loop4: detected capacity change from 0 to 215922
[ 2518.658952] loop2: detected capacity change from 0 to 215922
21:28:36 executing program 5:
syz_read_part_table(0xffffffff00000000, 0x0, 0x0)
21:28:36 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048122d, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2532.495790] loop5: detected capacity change from 0 to 264192
21:28:36 executing program 7:
syz_read_part_table(0x696e5b3, 0x600, 0x0)
21:28:36 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
r1 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24, 0x0, 0x0, 0x0, 0xffc0})
r2 = signalfd4(r1, &(0x7f00000000c0)={[0xa1]}, 0x8, 0x80000)
ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f00000003c0)={0x2, {0x2, 0x0, 0x8, 0xfff8, 0xcb2, 0x3}})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}}, 0x0, 0x8, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:36 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x4c, 0x0)
21:28:36 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="010000000001000000"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:28:36 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc020660b, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:36 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0xb6f6de2d1df1a102)
syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f00000003c0)='./file0\x00', 0x2, 0x6, &(0x7f0000000740)=[{&(0x7f0000000400)="09255e6b2caba338b9463337fc78e8f7595f3d3c09f0e056fc58949aefb287a8d66d7d7989ba71eff6bd48a51ebe3e219b561f3bf0a1a7ebf45b4bb6f98bfa24e50dd69103c3db292b2bc618bee784ff011a7ca7901161e9c08c4555a3e28d2641b99e336512", 0x66, 0x81}, {&(0x7f0000000480)="fd87cb979d9d7ee3cfa19b841f7c283e92a0027f0b8fe9b927f4c76e7d6421fdd3805c800db2837169151f6b16552c087f3dd6f126f06f03e8b7577b5fdf2adac4813505197e402ff28701d9ee9af6d77b1abe1b240e9a8e59828ced1ddc58fc2555e4f41f268aac2acb1a2415", 0x6d, 0x9}, {&(0x7f0000000500)="ae39af501a3ed1529fbbdc61e365805a8319799325ae229b02ff1706ecec03ad153ebc673d68da39f02e10a76c", 0x2d, 0xa168}, {&(0x7f0000000540)="db589821abf839798a077ff2cd4a0dba0f3961d97041ecba5e231b70c8645b70740708793de625cfe463cb35b0f213e452fdfa5121697f677e4f786e8ffc0bccd3bc908c1035ef634c7242d75f745ca92b8ca7b00e9c6a0d12b29b17dd19812533d4bb803311d9b3c14536ebcf29c8ccc2fcddc404ab2f953266bb9c1d6eaca2b3a40333e57950d2c2d2bf3e954609d2705f95ef6d8663ba250b7eb20c51dfaeb09447a2fcbcd6b2a0cf7ee84e9240a718bd75a987ac58c9393729bddf7ce256c3bf8672acfc1f3e0912aeff2fc594c388facfbc737783405b95fb54e10eb8b19a11a14268b669f089bc013b7aee", 0xee, 0x9}, {&(0x7f0000000640)="4122144659d17bbea0f7702e3df5d71ab0c9595673de213e39c032bb0ac340246a7e7d90925fbc15cbcd0bfba516ff3e37e722f0015f47303adb7a73b278d458faa8558112", 0x45, 0x100000000}, {&(0x7f00000006c0)="605b46c8ea9429f2b127d53043c94ba487e570732c6d3d5398d3b809f798dd144f867b19e397cc238b0e9b622643f112dd1c8a3015a462ed22e02b757ec64df602aa1182c199f541e4c84934c5609b29023500f5f863d433a8fe228b5f76", 0x5e, 0x6000000000}], 0x1000, &(0x7f00000008c0)={[{@session={'session', 0x3d, 0xe}}, {@mode={'mode', 0x3d, 0xffff}}, {@nocompress}, {@cruft}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fowner_gt={'fowner>', r1}}]})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2532.533967] 9pnet_fd: p9_fd_create_tcp (10509): problem connecting socket to 127.0.0.1
[ 2532.543145] loop4: detected capacity change from 0 to 215922
21:28:36 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r3 = getpid()
perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x20, 0x48, 0x81, 0x8, 0x0, 0x401, 0xa08, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x8, @perf_bp={&(0x7f0000000440), 0x1}, 0x7404, 0x1, 0xff, 0x8, 0xb895, 0x2, 0x3, 0x0, 0x3, 0x0, 0x2}, r3, 0xd, r0, 0x1)
perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x67aaa4fec5771cc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x7}, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f00000000c0)='children\x00')
[ 2532.570162] loop5: detected capacity change from 0 to 264192
21:28:36 executing program 7:
syz_read_part_table(0x696e5b3, 0x700, 0x0)
21:28:36 executing program 5:
syz_read_part_table(0xfffffffffffff000, 0x0, 0x0)
[ 2532.637729] loop2: detected capacity change from 0 to 215922
[ 2532.659334] loop2: detected capacity change from 0 to 215922
21:28:36 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x55, 0x0)
21:28:36 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048122e, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:36 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r0, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0)
r2 = perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0xad2, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, r1, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x1, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2532.733061] loop5: detected capacity change from 0 to 264192
[ 2532.798390] loop4: detected capacity change from 0 to 215922
21:28:36 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481223, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:36 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x68, 0x0)
[ 2532.842371] loop4: detected capacity change from 0 to 215922
[ 2532.873270] loop2: detected capacity change from 0 to 215922
[ 2532.897688] loop2: detected capacity change from 0 to 215922
21:28:53 executing program 5:
syz_read_part_table(0xfffffffffffffffe, 0x0, 0x0)
21:28:53 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:28:53 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481225, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:53 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:53 executing program 7:
syz_read_part_table(0x696e5b3, 0x900, 0x0)
21:28:53 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
r2 = syz_io_uring_complete(0x0)
ioctl$DVD_READ_STRUCT(r2, 0x5390, &(0x7f00000003c0)=@physical={0x0, 0x3, [{0xd, 0xa, 0x3, 0x7, 0x8, 0x0, 0x0, 0x2, 0x2, 0x0, 0x4, 0x1ff, 0x4}, {0xc, 0x6, 0x6, 0x5, 0x3, 0x1, 0x0, 0x3, 0xb, 0x1, 0x37c, 0xff, 0x9}, {0x6, 0x9, 0x3, 0x2, 0xd, 0x1, 0x1, 0x5, 0x0, 0x1, 0xa86, 0xffffffff, 0xffffc625}, {0x3, 0x7, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x9, 0x6, 0xfffffffc}]})
21:28:53 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048122f, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:53 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x6c, 0x0)
[ 2549.750815] loop5: detected capacity change from 0 to 264192
[ 2549.765719] loop2: detected capacity change from 0 to 215922
[ 2549.783236] 9pnet_fd: p9_fd_create_tcp (10570): problem connecting socket to 127.0.0.1
21:28:53 executing program 7:
syz_read_part_table(0x696e5b3, 0xa00, 0x0)
[ 2549.841577] loop5: detected capacity change from 0 to 264192
[ 2549.864459] loop4: detected capacity change from 0 to 215922
[ 2549.867686] loop2: detected capacity change from 0 to 215922
21:28:53 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x74, 0x0)
21:28:53 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x0, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x6, 0x2977}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="0100090000000000180000000b6afa5ebec766e5d6700ac1d7bc7296d72e208d74b61ef13820293e67793388310ae49087143f28099994dcb0285f64accc89", @ANYRES32=r1, @ANYBLOB='a\b\x00\x00\x00\x00\x00\x00./file0\x00'])
sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="14000008000000000000000000000000687566e0ab408f236372e8e48a0d8174d3a5782c996ce5a7417eb37ae4af8881fe137a5d98c7", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0)
openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x840, 0x22)
r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000700), r0)
sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000009c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="3c020000", @ANYRES16=r4, @ANYBLOB="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"], 0x23c}, 0x1, 0x0, 0x0, 0x880}, 0x40000)
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r5 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x8}, 0x0, 0xe, 0xffffffffffffffff, 0x9)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r6, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r7, @ANYBLOB], 0x18}, 0x0)
waitid$P_PIDFD(0x3, r7, &(0x7f00000003c0), 0x1000006, &(0x7f0000000440))
21:28:53 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481230, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:53 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:28:53 executing program 7:
syz_read_part_table(0x696e5b3, 0xd00, 0x0)
21:28:53 executing program 5:
syz_read_part_table(0xffffffffffffffff, 0x0, 0x0)
21:28:53 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048122a, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:28:53 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2550.056362] loop4: detected capacity change from 0 to 215922
[ 2550.058246] loop5: detected capacity change from 0 to 264192
[ 2550.059814] 9pnet_fd: p9_fd_create_tcp (10587): problem connecting socket to 127.0.0.1
[ 2550.062988] loop2: detected capacity change from 0 to 215922
[ 2550.081230] loop5: detected capacity change from 0 to 264192
[ 2550.100976] loop2: detected capacity change from 0 to 215922
[ 2550.139271] loop4: detected capacity change from 0 to 215922
21:29:18 executing program 7:
syz_read_part_table(0x696e5b3, 0xf00, 0x0)
21:29:18 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:29:18 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481258, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:29:18 executing program 5:
syz_read_part_table(0x0, 0x2, 0x0)
21:29:18 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048122b, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:29:18 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0x3, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
r1 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$F2FS_IOC_PRECACHE_EXTENTS(r2, 0xf50f, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3e}}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x261})
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/tty/ldiscs\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYRES64=r6, @ANYRESDEC=r1, @ANYRES16, @ANYBLOB="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"], 0x18, 0x20400c4}, 0x40000)
openat(r7, &(0x7f00000000c0)='./file0\x00', 0x343a00, 0x10)
sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r5, @ANYBLOB="b77c0a7ce6d560725a2b550000ea5c15d1e58ecb5b3bda299299d4546d5a42e075ce4986eff23e4ce0315de62d805d1c3958f06d576fcc5753d32f4d6d9434adb8a8d5aaaee94aa8070864f1a5030022e6b458567efcebfc81f1b5538d647a5c31b504655a621963089368e35e409da706ff", @ANYRES16, @ANYRESDEC=r0], 0x18}, 0x0)
ioctl$TUNSETLINK(r5, 0x400454cd, 0x7)
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:29:18 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x7a, 0x0)
21:29:18 executing program 0:
r0 = socket$inet6_icmp(0xa, 0x2, 0x3a)
ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f00000000c0)=0x2)
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r6, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r7]}}], 0x18}, 0x0)
io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f00000003c0)=[r7], 0x1)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:29:18 executing program 7:
syz_read_part_table(0x696e5b3, 0x1100, 0x0)
[ 2575.143346] 9pnet_fd: p9_fd_create_tcp (10616): problem connecting socket to 127.0.0.1
[ 2575.151008] loop2: detected capacity change from 0 to 215922
[ 2575.199047] loop2: detected capacity change from 0 to 215922
[ 2575.212928] loop4: detected capacity change from 0 to 215922
21:29:18 executing program 5:
syz_read_part_table(0x0, 0x3, 0x0)
21:29:18 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
chdir(&(0x7f00000000c0)='./file0\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0xa80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x10}, 0x0, 0xfffffffffffbffff, 0xffffffffffffffff, 0xb)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0)
setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f00000003c0)={@multicast2, @broadcast}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:29:18 executing program 7:
syz_read_part_table(0x696e5b3, 0x1200, 0x0)
21:29:18 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x90, 0x0)
21:29:18 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048122d, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:29:18 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481263, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2575.373832] loop4: detected capacity change from 0 to 215922
[ 2575.391207] loop2: detected capacity change from 0 to 215922
21:29:34 executing program 5:
syz_read_part_table(0x0, 0x4, 0x0)
21:29:34 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:29:34 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048122e, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:29:34 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
fcntl$getown(r0, 0x9)
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KDGKBLED(r0, 0x4b64, &(0x7f00000000c0))
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:29:34 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r3 = perf_event_open(&(0x7f0000000280)={0xd, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x0, 0xee00}}, './file0\x00'})
accept4$unix(r4, &(0x7f00000003c0), &(0x7f0000000440)=0x6e, 0x800)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:29:34 executing program 7:
syz_read_part_table(0x696e5b3, 0x2000, 0x0)
21:29:34 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481264, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:29:34 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xf0, 0x0)
[ 2591.031802] 9pnet_fd: p9_fd_create_tcp (10666): problem connecting socket to 127.0.0.1
[ 2591.049909] loop4: detected capacity change from 0 to 215922
[ 2591.061299] loop2: detected capacity change from 0 to 215922
21:29:34 executing program 5:
syz_read_part_table(0x0, 0x5, 0x0)
21:29:34 executing program 7:
syz_read_part_table(0x696e5b3, 0x3f00, 0x0)
21:29:34 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r1, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x0, @private=0xa010102}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2591.114748] loop2: detected capacity change from 0 to 215922
21:29:34 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xfe, 0x0)
21:29:34 executing program 7:
syz_read_part_table(0x696e5b3, 0x4000, 0x0)
21:29:34 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481269, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:29:34 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048122f, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2591.317187] loop4: detected capacity change from 0 to 215922
[ 2591.341104] loop4: detected capacity change from 0 to 215922
[ 2591.371754] loop2: detected capacity change from 0 to 215922
[ 2591.393009] loop2: detected capacity change from 0 to 215922
21:29:52 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
r1 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
write(r1, &(0x7f0000000400)="d81d5a60d3be24b4150e96d04fa90dc84a041545c0ee75782930e98ad72160263ab4be2b42d426b0afe6517385afd5712281d580c41cdc74f8959cf9a93637d5810344bb89f84f5228991dbafdc4b01cd5ed7a901390ea5c8ee3b7b55fa5fb4d4d1d6f5330e41de6751dd2d8159a79d9c189b507553950e143304303d50334381fca328a0b37435731d26c9034e653566084eb0fb270f3528402bb8731e1d3e72e903bb0b7096c7f25ba6048129e5be67ddf420313bfb511e5986d4a273e980fe48ac9dbff80ae4590b3", 0xca)
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
r4 = signalfd4(r3, &(0x7f00000000c0)={[0x6]}, 0x8, 0x80000)
ioctl$CDROMREADTOCHDR(r4, 0x5305, &(0x7f00000003c0)={0x4, 0x81})
chdir(&(0x7f0000000500)='./file0\x00')
21:29:52 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x300, 0x0)
21:29:52 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481230, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:29:52 executing program 5:
syz_read_part_table(0x0, 0x6, 0x0)
21:29:52 executing program 7:
syz_read_part_table(0x696e5b3, 0x4800, 0x0)
21:29:52 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048126c, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:29:52 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
read(0xffffffffffffffff, &(0x7f00000000c0)=""/9, 0x9)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14400000000000000100000801000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0)
ioctl$FIBMAP(r3, 0x1, &(0x7f00000003c0)=0x7)
21:29:52 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
[ 2608.445345] loop4: detected capacity change from 0 to 215922
[ 2608.457776] 9pnet_fd: p9_fd_create_tcp (10721): problem connecting socket to 127.0.0.1
21:29:52 executing program 5:
syz_read_part_table(0x0, 0x7, 0x0)
[ 2608.498905] loop2: detected capacity change from 0 to 215922
21:29:52 executing program 7:
syz_read_part_table(0x696e5b3, 0x4c00, 0x0)
21:29:52 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x7ff, 0x4)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3, @ANYBLOB="00000000c4a4689ab3d69df562e1ecd7d22106391d54c7f23182be28ef382e51efbcf431d2216db499222cfd73b49cce2056060575e1f6f3b0cac5602628d0482c149405b18ec81b3690dba210a877e2a26bd0fc14216f3194f06d9cdef76d2643006962a3fd2c14d98591735b9b963bd625e4d8ab76db5d1480a05994cf81b1c9f2fe74140cdfb6f8042bec7cd5dd449c6fc681773fdac668b127"], 0x18}, 0x0)
ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, &(0x7f00000003c0)={{0x2, 0x1}, {0x5, 0x20}, 0x5c, 0x7, 0xb6})
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x0)
r4 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:29:52 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9)
openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x220000, 0x68)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2608.577576] loop2: detected capacity change from 0 to 215922
21:29:52 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x500, 0x0)
21:29:52 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048126f, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:29:52 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481258, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2608.695189] loop4: detected capacity change from 0 to 215922
21:29:52 executing program 5:
syz_read_part_table(0x0, 0x8, 0x0)
[ 2608.788856] loop2: detected capacity change from 0 to 215922
[ 2608.848082] loop2: detected capacity change from 0 to 215922
21:30:07 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:30:07 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481263, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:07 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481270, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:07 executing program 7:
syz_read_part_table(0x696e5b3, 0x5500, 0x0)
21:30:07 executing program 5:
syz_read_part_table(0x0, 0x10, 0x0)
21:30:07 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x4, 0x0, 0x0, 0x1080000, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x9e27eb92612e4a93, 0x0)
fcntl$lock(r2, 0x7, &(0x7f00000003c0)={0x1, 0x2, 0xffffffffffffff1a, 0x1f})
r3 = clone3(&(0x7f0000004c00)={0xc0000500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
capset(&(0x7f0000000000)={0x20080522, r3}, &(0x7f0000000040)={0xfffffff9, 0xe385, 0x200, 0x9, 0x80000, 0x7f})
perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$KDDELIO(r2, 0x4b35, 0x4)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:07 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x600, 0x0)
21:30:07 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
fcntl$setpipe(r0, 0x407, 0x5)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
r2 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
r4 = syz_open_dev$evdev(&(0x7f0000000600), 0x6, 0x402)
readv(r4, &(0x7f0000000800)=[{&(0x7f0000000640)=""/154, 0x9a}, {&(0x7f0000000700)=""/23, 0x17}, {&(0x7f0000000740)=""/133, 0x85}], 0x3)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000540)=ANY=[@ANYBLOB="015fb00c99d76124bb000000", @ANYRES32=r2, @ANYBLOB="ff070000000000002e2f66696c653000"])
write$P9_RREAD(r5, &(0x7f0000000840)=ANY=[@ANYBLOB="3b000000750700300000005a9fbdf6d6560ad6d93e463279459a2b0af27a356aee100690a508dcee0a1eddf509f3089228fd97fef68671d21ff650e267aeff5c3efbca6f561904113b0a70"], 0x3b)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000580)={{}, 0x9, 0x7, 0x9ff})
syz_read_part_table(0x696e5b3, 0x0, 0x0)
r6 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x400, 0x0)
ioctl$INCFS_IOC_FILL_BLOCKS(r6, 0x80106720, &(0x7f0000000500)={0x1, &(0x7f00000004c0)=[{0x2, 0xd3, &(0x7f00000003c0)="b3c9edf56a3cf8d38911a462bd0922fb13e0b3c7c4521769fae32953a3a84e8e32887ed3f0e3c4e7650335268d5aef6cb48d082b72cdb0996227e7ee9befdb058fe0f1e528907b0d31d68cdb8b3aafcc742c6115df1d01aedbc145d5c5308f7c768728134f2d7eb7703b98d745f8013e36c6b4ab0f23948733d587be4ae2aed16880a25af9b6446669ac84110166ae56cadf0255af76f09826f49915bdb485fa894a6a415cc5348b66b2c1baefc50fe3a315a1f38383d62889b4451f078308735b2c43b094088b58f7793f73e2d2b04c65180e", 0x1}]})
setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f00000005c0)=0x1000, 0x4)
[ 2623.930285] 9pnet_fd: p9_fd_create_tcp (10758): problem connecting socket to 127.0.0.1
[ 2623.933319] loop2: detected capacity change from 0 to 215922
21:30:07 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x81, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
gettid()
r3 = openat$cgroup_ro(r0, &(0x7f0000000400)='cpuacct.usage_all\x00', 0x0, 0x0)
ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440))
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
r4 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x5, 0x40000)
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000003c0)={'vlan0\x00'})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2623.973061] loop2: detected capacity change from 0 to 215922
21:30:07 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481264, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2624.067274] loop4: detected capacity change from 0 to 215922
21:30:07 executing program 7:
syz_read_part_table(0x696e5b3, 0x6800, 0x0)
21:30:07 executing program 5:
syz_read_part_table(0x0, 0x12, 0x0)
21:30:07 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2624.231379] loop2: detected capacity change from 0 to 215922
21:30:07 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x700, 0x0)
[ 2624.438791] loop2: detected capacity change from 0 to 215922
21:30:23 executing program 5:
syz_read_part_table(0x0, 0x48, 0x0)
21:30:23 executing program 7:
syz_read_part_table(0x696e5b3, 0x696f, 0x0)
21:30:23 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:30:23 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"})
r3 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r4 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0, 0x0})
ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000006c0)={{}, r6, 0x0, @inherit={0x60, &(0x7f0000000640)=ANY=[@ANYBLOB="030000000000000000000000000000000000e0000000000000000000000000000700000000000000000000000000000000000000000000009a090000000000000600000000000000ff00"/88]}, @subvolid=0x1})
ioctl$BTRFS_IOC_DEV_REPLACE(r2, 0xca289435, &(0x7f0000001500)={0x3, 0x4, @start={0x0, 0x0, "e1692a301966418d02028abd2c118de7ed72a9ecbac6de93679cd9865ea673ad09c6a5bf55e22ce1e9697cfeaf38462b18771e22a6324d2456b5dc869e0c9ee5f8ad2d33e29ad4ebe37149a9888dabbcb8b364c607437f7ad59d90039e63572f21b99c3f7a3e63307701e2989751fbaf59ef42c93d27b85910ba09b8909509b94e5bbb8c24e6817ecdd210a0a5265973112fd012b60b129eaae9d157a22fa31cb13088eec483101a7c44d2dba2f410c1622f3bac64ab4d30bcb242543e5bb1d03111bb326afb443d8e0788a5dbee3cdf74fd49738653f59ea4c624028a8dad00601411b1893ab05669e8cce1408f8bed830c0e9e6f43d4578adb10677436ef0332aabc46d0361acd1d7b66b177aca5a1234ffaf994186373144c868ec43215e8d6a835189b9387e7540ec21441d6c48a2583c11498d75fd4251ed0b9c0cd976932250452c34db13ad7c5cdbd54cb84d6f5f59f7166f94ca8dadf398472874172d23cd5909f78fefa7359dd7a4147609e72a3b958d74f733dca562cc84b81dcf47c0c34463580bcd152cd1230fd1955e808f80166424ec4096e2903773436fc21cdf6e039771da9b635c2c8c8a92ddea3fea3126a724708a99f53841bd1b663b9ac2edd11a81be6cbfa67567971cde6538684b84ef436f343a31c9b635f5bef80f7b0418af17eaf67e7e50c40aca765930e780af9a16695e55b053fa3d74ee274de8e67ba9f43b2bb9bc73cab00ecfdad78a751ab6b0a5fc3f32cb66757f53315eac799d999f5cee89d6a2d1833db495bfdf830d6c3e6c82ed299da3f0d0bf914f2e16567242c03400540739032e3f5feb7fb1b921cbbdbb1e6ca5dd8105a98663f1f25b8d8a7874faa649c6696006e2ee47b298f577e0b65964de03b20b5f56a6418620e3b03315da74755db0091adf46c9a2edb7882a513862f53b13d9bfe4d95362be3001639a77bb7d38c04dff2b4d431bce77df6977f53c5c6662c005cff5c9ae38da8d57780aa82ec1b6dcd65bca9eef81a386074f7850420e60f7b8735af4110dc3575b4c115b4bc4089b8cf00afc7c2f796041d5951b83cae7050c316c49767cf7cb181112a2de1e297e71044a31a3bcc65ec746e6edd1c7a07b2bd2ebf34d9bca6b048eeca7cd2915594d4a812343b202c8e9473aec26db8a6e0dbaa6f0fa9ba11733d31179e7a1ace99f97c200080d4aaf8838e1b16a7e7c622e727a87441ecc93789f82c4c7bd584b6fbbbb63a19bad03b1b9c9b31f36198abe844d71a94c523df665f7459622112e53f1bee252cfae69ad8567b770016a997fadf1a70edf2292abd7cd954eda77dc271f44334a892dd4cbf1486b53c45134551c5f1aac25c607bf10bd8314008ae8d9fcfa216f2bbdc1c1342d6d74a379d49c1e1c8de342d9bf532c7c598351d006464902db0a7522bf97f23eb192bf07685da9cf7", "153fba521c1a81e6db4ef3c1bad601da16845a2165ae49b298fba1bc72812be3e74cb86fd6c5578e48ee0544b27783cef39af3ec0a65df31ed4514cb5853be2c9edbf67c58bb03195f0b74e92379084b21a758983757425168b10dd70b88ba1f185db41e5657c2a8d4c3d05fcffa20acf728fa7d25e3b4d3cab8cbe6835013b2af9f24b906c94a263ce107e63d07f157aceb0e38f94e986f2d0bf931fc538d5026eadbde96ee0833f99e95b2da35030aae04dba347362cfd021528b11468ed8039659c6a78231bd245817436411a3a1ada6be08759b86d61bda4f703e705252dbf0d7aba892cb34bc94a3e2e7cf7b9adb04108b8f6184a72b9feb2fac65994a86965a1fbdabea530d0693aaeceb4777d30acbe0d18e381ade7384e505c9d64aab08e0405a351c9b77ffeb74baa6a9c64445b443e74f7ac670acf24b586c354b843a85c09a0c6a669eabd45c4921b4b5530bc35483595697469232138808a4884fda2b982c61839d93978f5b1f14654200c8dcc23fc72d2ca5a92f28f94a9b6c65c3f16c4f9f7750a679f60dd1abf703f414413d37c7381f007178b76f5e7c202cbe91d25d67368670826881a317d283849aa78f7f53ed6ce55e0c63e271b22cd4138fd08f0c30cb1b3fed1deeb2d22bebc5502379b6b84b37e2ec54b50d5df5df940cb54e1bbda7f46fcbfe62913000cc89864f5328a435ce3c429589f6aeae2d76dbee10ce4c0c7342bf3f52e6feb72f5297927b01603b875222f2c599110d8f821b8973e59eb2f3a8607f1664f5941c6c4d0dbdcee89660141e07f29df983859762309d6a915accb6e5f51652d1680b2c3cb4722cbb71cefc4593d5493556094eb0e5162b67c44c35de4db0f81655e0958c31e3110cad2d4db3468331d2a3b6cc5fca2e854001bb860d6a4071777a960502b212ad928624f7c6ab931d9eb0f1b38c06c8e808de1fb7c01aeeffd32e3aa2381547d18c5d11815fe93a2ec9d4095fec9cf4fb7e7aa922640953847c819f53bb522eca496d66a7ee4542effe0d25de10e0801e592c19485140353412d8c490779c4a3792a078b402dbb3ab66427f6a476fbe33bbd3dfb7876048ea37499e7b311051739e1c3dc5ddc075e1cef25d79193f24bcbe94939ea59704793abeb43d9a9114fabbaa8d3328aeff68c7d184f407e5a08903952b13f6f5c77e28c4879612f1921201cceab7e6826abf9d680e553bea505c8fb88862a7328f1cc11860d53f82735e363637d12ad4179732b15ed0e5d6770fbc74ad08c26dfd2cf816e97b003719a94bb0beadd155c675cd0bb51bc5acbe8d043131f9540fdd47d2e1ccb5080f502f7f5f6041db481393882308663a6476db7f2fe490dc7f0d9f60daacd6121c6412181413c84b5d43eee0d25580c00af1961aefd75ca5cfe139e3e211771b48b7c83d59ad81ffb09ea1644f875"}, [0x400, 0x4, 0x7, 0x194, 0xbd47, 0xad, 0x4, 0xfffffffffffffffe, 0x7, 0x80000001, 0x7f, 0x983, 0x800, 0x9, 0x8, 0x400, 0x7, 0xfff, 0x9, 0xc00000, 0x0, 0x3, 0x401, 0x8001, 0x5, 0x8, 0x1, 0x8000, 0x6, 0x6, 0x4, 0x1, 0x83, 0x4ae43bce, 0x8, 0x5, 0x100000001, 0x1000000000000000, 0x8, 0x80000000, 0x800, 0x7, 0x7f, 0x4, 0x0, 0x7, 0x6, 0x1, 0x2, 0x3, 0x4, 0xffffffffffffff7c, 0x9, 0x0, 0xf6, 0x10001, 0x7, 0x7fff, 0x8000, 0x6, 0x7, 0x100000001, 0x4, 0x8000]})
ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000001f40)={{r3}, r6, 0x18, @inherit={0x68, &(0x7f00000003c0)={0x1, 0x4, 0x20, 0xa6a47f3, {0x1a, 0x0, 0x54f3bc5a, 0xc77, 0x10001}, [0x1, 0x401, 0x3, 0xff]}}, @devid=r7})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000000c0))
21:30:23 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481269, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:23 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:23 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x900, 0x0)
21:30:23 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481275, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2639.949103] loop4: detected capacity change from 0 to 215922
[ 2639.949942] 9pnet_fd: p9_fd_create_tcp (10818): problem connecting socket to 127.0.0.1
21:30:23 executing program 5:
syz_read_part_table(0x0, 0x4c, 0x0)
21:30:23 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:30:23 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xa00, 0x0)
[ 2640.041350] loop2: detected capacity change from 0 to 215922
21:30:23 executing program 5:
syz_read_part_table(0x0, 0x68, 0x0)
21:30:23 executing program 7:
syz_read_part_table(0x696e5b3, 0x6c00, 0x0)
[ 2640.113936] loop2: detected capacity change from 0 to 215922
21:30:23 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
r4 = fspick(r0, &(0x7f00000000c0)='./file0\x00', 0x0)
ioctl$F2FS_IOC_FLUSH_DEVICE(r4, 0x4008f50a, &(0x7f00000003c0)={0x8001, 0x81})
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r6]}}], 0x18}, 0x0)
r7 = accept$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000004c0)=0x14)
sendfile(r6, r7, &(0x7f0000000500)=0x6, 0x8)
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000400)={'wg1\x00', 0x0})
setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000440)={@dev={0xac, 0x14, 0x14, 0x2c}, @multicast1, r8}, 0xc)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:23 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481278, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2640.168394] 9pnet_fd: p9_fd_create_tcp (10835): problem connecting socket to 127.0.0.1
21:30:23 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
r2 = pidfd_getfd(r0, r1, 0x0)
ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000400)=0x0)
ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, &(0x7f0000001500)={{r2}, r3, 0x6, @inherit={0x50, &(0x7f0000000440)={0x0, 0x1, 0x1, 0xfffffffffffffffb, {0x17, 0x7fffffff, 0x1, 0x7, 0x80}, [0x5]}}, @name="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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
r6 = syz_open_dev$evdev(&(0x7f00000004c0), 0x3, 0x10000)
ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000002500)={{r6}, 0x0, 0x8, @inherit={0x70, &(0x7f0000000500)={0x1, 0x5, 0x9, 0xffffffff00000000, {0xd07a868f3837e7da, 0x6, 0x6, 0x200, 0xffffffffffffff24}, [0x400, 0x1, 0x80000001, 0x81, 0x200]}}, @name="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"})
sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0)
ioctl$KDGKBMETA(r5, 0x4b62, &(0x7f00000000c0))
r7 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa0a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:23 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048126c, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:23 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xd00, 0x0)
21:30:23 executing program 7:
syz_read_part_table(0x696e5b3, 0x6f69, 0x0)
[ 2640.277878] loop4: detected capacity change from 0 to 215922
[ 2640.288201] loop2: detected capacity change from 0 to 215922
[ 2640.333032] loop2: detected capacity change from 0 to 215922
21:30:23 executing program 5:
syz_read_part_table(0x0, 0x6c, 0x0)
21:30:23 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
[ 2640.431701] 9pnet_fd: p9_fd_create_tcp (10862): problem connecting socket to 127.0.0.1
21:30:40 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:30:40 executing program 5:
syz_read_part_table(0x0, 0x74, 0x0)
21:30:40 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0)
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:40 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048126f, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:40 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xf00, 0x0)
21:30:40 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048c2d6, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:40 executing program 7:
syz_read_part_table(0x696e5b3, 0x7400, 0x0)
21:30:41 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xf6, 0x1, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x40000, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
ioctl$BTRFS_IOC_SPACE_INFO(r2, 0xc0109414, &(0x7f0000004c80)=ANY=[@ANYBLOB="900a00000000000009000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009f23c8962cb60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f50000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000078420000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002e5b40f0b6dead00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002280a37b2061c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e754948a9b04d8e8c3883479592a787f045e9f32fd736c555bfbb91d192e62f34264cd22d77845e10bcbbc9344fdc2b611aca4afaa46dc2ec614b48972afc943686a5f0e956edacb2c8574b0459f2275b6adf7d4a510d1235d3e57cde67b64df4f98db5917ffc2fce42da5d2f80b7209bf99d0c2efb28cd9b0428e60a7b689d4c974705600c8f6a66d543a470056d6db1944045cd19a1de9773521063f9517d126a563cabcbd04d47175b30c204ade9ae7a180c0ccf778fbe5364599f7482b05d3ce64c21ed60ae167e0c0997c199038ba273e41384217ded263aff65c448747abf7eb53f4b0201ffbae4b6c"])
socket$inet_udp(0x2, 0x2, 0x0)
ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, &(0x7f0000000540)=0x4f)
ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0))
r3 = clone3(&(0x7f0000004c00)={0xc0000500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)={0xfffffffb, 0xe385, 0x200, 0x9, 0x80000, 0x7f})
perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x4, 0x80, 0xfe, 0x1f, 0x0, 0x41, 0x4060, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000440), 0x8}, 0x1400, 0x1, 0x1, 0x6, 0x4, 0x8001, 0xeb60, 0x0, 0x8, 0x0, 0x4}, r3, 0x10, 0xffffffffffffffff, 0x9)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000003c0)=0x0)
perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x6000, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
21:30:41 executing program 5:
syz_read_part_table(0x0, 0x7a, 0x0)
21:30:41 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
fchdir(r1)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2657.466036] 9pnet_fd: p9_fd_create_tcp (10878): problem connecting socket to 127.0.0.1
[ 2657.469009] loop2: detected capacity change from 0 to 215922
21:30:41 executing program 7:
syz_read_part_table(0x696e5b3, 0x7a00, 0x0)
[ 2657.492923] loop2: detected capacity change from 0 to 215922
[ 2657.519134] loop4: detected capacity change from 0 to 215922
21:30:41 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x1100, 0x0)
21:30:41 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481270, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:41 executing program 7:
syz_read_part_table(0x696e5b3, 0x9000, 0x0)
21:30:41 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:30:41 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2657.670343] loop2: detected capacity change from 0 to 215922
[ 2657.674768] 9pnet_fd: p9_fd_create_tcp (10907): problem connecting socket to 127.0.0.1
[ 2657.700864] loop2: detected capacity change from 0 to 215922
21:30:58 executing program 5:
syz_read_part_table(0x0, 0xf0, 0x0)
21:30:58 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
socket$nl_audit(0x10, 0x3, 0x9)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000980)='net/rfcomm\x00')
ioctl$RTC_IRQP_SET(r3, 0x4008700c, 0x207)
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
r5 = syz_mount_image$tmpfs(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, 0x6, &(0x7f0000000800)=[{&(0x7f0000000480)="c9489f7cd65d1d500683dd", 0xb, 0x8}, {&(0x7f00000004c0)="27803e4221e59758959c2d036c9e29af8f120fa5febdba7fcf3f0e527405f95696606fc4af506f1bdb678db1f257529711307313a298ee13c98344d5a5938e3416afd56dc4aa5ef4b8ca563f8253b280611f6816b40d0a6161a1718d2172527b7d84bb5eb284ec16b14028a3d8e64de31cfc816a63428a2209df9bf93d78a449dfb2c8f23f9aa9d07663da2a136fded32b5ac8aa9f", 0x95, 0x2}, {&(0x7f0000000580)="d9a816d987671ae3f68412401eb88167782685022b47de6a31d614cf4c1bf8ace0115748af4bd08d301d36e28516ad15675aa2783d8110b496b5fe33b756e2ca70fab636f1c0b34fbad63ff1622c08f620ef0daee64ba5647aff6da8d80242e795c762c3e4f8411a9760def9f16f68492e5e33b8d163fb10e73bf43a66ec933c4b9ff50cad74b4d45a0386e867e77209da4ed729db3abc", 0x97, 0x8}, {&(0x7f0000000640)="59670bccab4d57794a23c897e88d3f4817c1fc36e3b3ae40573818b2e4cddb60e197ec4f39d18b49d47502fd7aedef139864e64addc42ea67c74ef8b64271a19ea76d25f6990c662125b668d11f906dec94bcbf319055ca8a1fe8ba5711ea9017c3008bd136ceef2c71317aa70020a686b5df7ac36ef10164d5ccfa108e299f1c6a506744fbce3", 0x87, 0x20}, {&(0x7f0000000700)="c484aa1337201ee55b9ce200e30586a2da0ca61733b33e601c0695521dbd42215a10e2b9233578f859b89acd249d3c3fc6921e20b3dabbe5638201555a6ce252aef1afad2127c0aeef10de8756c698058ae1063fda8f8ba2540036b3064990201d6e3cf2ee4e7ac03c58b00b125ea4a1db8de01507a27ef1cb1354b1de", 0x7d, 0x40}, {&(0x7f0000000780)="c92dd76774cf1bc507577cfc5f68cc0a34ec83781daf0a796909634d3515ffc9e49beed332bd7c492dfe650d69e0a174259e6b2cc55ea73f8fa7cadcce25f67bc03976b4f455a0da7d4b", 0x4a, 0x5}], 0x14011, &(0x7f00000008c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0xc, 0x31, 0x39, 0x25, 0xa842f0b8e49f1559, 0x6d]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x30, 0x30, 0x25, 0x30, 0x70, 0x70]}}, {@huge_advise}, {@huge_never}], [{@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]})
fsconfig$FSCONFIG_SET_PATH(r4, 0x3, &(0x7f00000000c0)='/dev/vcsa#\x00', &(0x7f00000003c0)='./file0\x00', r5)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:58 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x1e2a3, 0x0, 0x0, 0x6, 0x1000, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xa)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:58 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x1200, 0x0)
21:30:58 executing program 7:
syz_read_part_table(0x696e5b3, 0xf000, 0x0)
21:30:58 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:30:58 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481275, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:58 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048d6c2, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2675.361881] loop4: detected capacity change from 0 to 215922
[ 2675.368181] 9pnet_fd: p9_fd_create_tcp (10928): problem connecting socket to 127.0.0.1
[ 2675.374251] loop2: detected capacity change from 0 to 215922
[ 2675.400528] loop2: detected capacity change from 0 to 215922
21:30:59 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x2000, 0x0)
21:30:59 executing program 5:
syz_read_part_table(0x0, 0xfe, 0x0)
21:30:59 executing program 7:
syz_read_part_table(0x696e5b3, 0xfeff, 0x0)
21:30:59 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481278, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:59 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:30:59 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x0, 0x80, 0x2, 0x0, 0x0, 0x6, 0x8, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2, @perf_config_ext={0xfffffffffffffffb, 0x5}, 0x10c0, 0xa6f, 0x9, 0x2, 0x0, 0x2, 0x43a8, 0x0, 0x6, 0x0, 0x9}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:59 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:30:59 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
recvmsg$unix(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000640)=""/82, 0x52}, {&(0x7f00000006c0)=""/110, 0x6e}], 0x4, &(0x7f0000000780)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe0}, 0x2042)
stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0})
setresuid(0x0, r4, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f00000003c0)='./file0\x00', 0x4f, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000400), 0x0, 0x7}, {&(0x7f0000000440)="81d497f9430b476ec852c80d3570a0ab5a93209e6d30fd6ab311e97065fd45aeed2b21ac3e986f49d6b8a5e4319f073f5b410a7cafe17021a8f074ffc7e80ed6a879724ef40b5d3f4cdce2e023950cb0a5c2", 0x52, 0x10001}, {0xffffffffffffffff, 0x0, 0x72f}], 0x0, &(0x7f00000008c0)={[{@huge_within_size}, {@huge_advise}, {@uid={'uid', 0x3d, 0xee00}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x6d, 0x38, 0x35, 0x25, 0x37, 0x31]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x2d, 0x25]}}, {@mpol={'mpol', 0x3d, {'local', '=relative', @void}}}, {@size={'size', 0x3d, [0x30, 0x31, 0x30, 0x35, 0x65, 0x67, 0x6b]}}, {@uid={'uid', 0x3d, r3}}], [{@euid_lt={'euid<', r4}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/vcsa#\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}, {@subj_type={'subj_type', 0x3d, '/dev/vcsa#\x00'}}, {@uid_eq}, {@fsmagic={'fsmagic', 0x3d, 0x80000001}}, {@euid_lt={'euid<', 0xffffffffffffffff}}, {@seclabel}]})
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2675.569188] loop2: detected capacity change from 0 to 215922
21:30:59 executing program 7:
syz_read_part_table(0x696e5b3, 0xff0f, 0x0)
[ 2675.598517] 9pnet_fd: p9_fd_create_tcp (10961): problem connecting socket to 127.0.0.1
21:30:59 executing program 5:
syz_read_part_table(0x0, 0x300, 0x0)
[ 2675.643905] loop4: detected capacity change from 0 to 215922
[ 2675.720723] loop4: detected capacity change from 0 to 215922
21:31:15 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
r4 = socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f00000000c0)=0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f00000003c0)={"91bb6da0c3db1f589275eb6cbe66254d", 0x0, 0x0, {0x1000, 0xeb}, {0x6, 0x5}, 0x6, [0x785, 0x800, 0x6, 0x1, 0xb6, 0x80, 0xfffffffffffffff8, 0x1, 0xfffffffffffffff7, 0x4, 0x8, 0x800, 0x35, 0x2, 0x800, 0x6]})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f00000004c0)={"f973008724e9c94bacb4c3f417f51ee9", r5, r6, {0x7e6, 0x100}, {0x2, 0x6}, 0xd6, [0x3, 0x0, 0x40, 0x3, 0xbf85, 0x9, 0x2, 0x7, 0x8, 0x9, 0x2, 0x6c7c, 0x5, 0x7ff, 0x0, 0xc36]})
21:31:15 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:31:15 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x3f00, 0x0)
21:31:15 executing program 5:
syz_read_part_table(0x0, 0x500, 0x0)
21:31:15 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:31:15 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x4, 0xffffffffffffffff, 0x2)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:31:15 executing program 7:
syz_read_part_table(0x696e5b3, 0xfffe, 0x0)
21:31:15 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048c2d6, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2692.366733] 9pnet_fd: p9_fd_create_tcp (10991): problem connecting socket to 127.0.0.1
21:31:16 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x4800, 0x0)
[ 2692.433357] loop4: detected capacity change from 0 to 215922
21:31:16 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:31:16 executing program 5:
syz_read_part_table(0x0, 0x600, 0x0)
[ 2692.518191] loop2: detected capacity change from 0 to 215922
[ 2692.545608] loop2: detected capacity change from 0 to 215922
[ 2692.559148] 9pnet_fd: p9_fd_create_tcp (11004): problem connecting socket to 127.0.0.1
21:31:30 executing program 7:
syz_read_part_table(0x696e5b3, 0x34b6a, 0x0)
21:31:30 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x4c00, 0x0)
21:31:30 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, 0x0, 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:31:30 executing program 5:
syz_read_part_table(0x0, 0x700, 0x0)
21:31:30 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x5, 0xfb, 0x1f, 0xfa, 0x0, 0xfffffffffffff000, 0x1100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdfa, 0x0, @perf_bp={&(0x7f00000000c0)}, 0xa108dba22f17ae0e, 0x8, 0x2, 0x1, 0x8, 0x4, 0xfa87, 0x0, 0x684, 0x0, 0x2}, 0xffffffffffffffff, 0x3, r0, 0x4)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000440)={@multicast2, @dev={0xac, 0x14, 0x14, 0x21}}, 0xc)
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:31:30 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x6, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
r3 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f00000000c0)={0xd, 0x8})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000005040)={{0x1, 0x1, 0x18, r0, {0x0, 0xffffffffffffffff}}, './file0\x00'})
ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x0, @broadcast}, 0x24})
r5 = syz_mount_image$iso9660(&(0x7f0000003a40), &(0x7f00000003c0)='./file0\x00', 0xfff, 0x6, &(0x7f0000003680)=[{&(0x7f0000000400)="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", 0x1000, 0x3f}, {&(0x7f0000001500)="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", 0x1000, 0x52fb}, {&(0x7f0000001400)="c4028709af9cb54a44a9500b8c3b0e06ed11a0cbba07f924f8f5d7fc94917f1e1841315c6e58182a8c2308b9b924cb90391e95f7cb5cc25f8669490bb031d619a5ea7dcae864d990c4db32e4014d3a9ab6b77d43765d41394107c0cb880f6014cb4d3fd81598c56506e56c9c62c7c0281742221cfefc458c01fdbd", 0x7b, 0x4}, {&(0x7f0000002500)="f53709734e5f4cb0d5dab44c007c53b793bd86d7dc9f022fdb59c5fba1e02b5a87c8e795d8443961098afec431157b38d247e10e62d7008e74d1b949843725f05b7929754bf71fd39ab8a5b6ef3d0e085602619d30eb12d0b39f2d2160084613", 0x60, 0x3}, {&(0x7f0000002580)="a3f160f3d6eb139c61505ef89e5cef6da450145ed8bd604fc294c9a90afe8c3df77f2faf94a42ba5dd8a538af18b86c0b32c25f65da89baf1f2c231534fcef38e4783b85a37da39e454472e3dfaf1c9d4c98455fb57c8d8f3158ecfb80878d36e206c133d6604d68224a9a51b1782bd399e29670fd768e42ae6f90ced43ebb73dbf6184e08045c240085fec57aa8b6f934432aeeb2960456a0c2eb95e85eeb968647d02b3a8bd6cef8b606c305c802a1ce92eca9cc75072d9e062c47b2900e7b34f1822a95d652f8f860300edb912fd1c3e61b6f71dfc26798220c51a27de16042f269ffcb0904687f845aa295e8be39b512dd40", 0xf4, 0x9}, {&(0x7f0000002680)="9e9721cd10cde8585f3fd5eee7579febdd72bfa0db4b653fcacf23df42b750da60d16cad0dcb336b19098aa82e31ef3030eb111ebd29ce946933e98a7e7e33bb98d51dd5894ef479f79bcacca6098ac5b12eb203d1cd928d914a11d9b756b5abfae80de4a0cef9830776a2261f715fe0a44586df898f2bf35c34512550ef2cf93706fbbdd523a46ed27f04649fe3792a97c7f936b04ad78ba9cd261d9d565cf357dea434da02edfd4fba42d022eb978d475847e455e092f802025431c14bc29f6a9d968dddd3b29439e4662cbfabe17c8989ecd2163c0079928aaaa1a038d076c8d44097143d5f49e22f9af60489b52109972e7fdf1d9668e51168cc655db68ecef1f4346e0e8fc72940b72e79d78f89237a3723fdeb26ae54002001486f208681b6b7f802e5d56404fce59f1815ff31e9c2a86d3c829cecb49e41af9989aa18a67be331f157e1744b5871f793d4809559c8c130a63dee219b58a410df1c5870f86c20a7a6c32e85647d5dae3a07b4ae4956d77a89f0e3585bc5d7f1e8b43b08eba3d2c4d709bfda88005ff702da43b6ebc28cbc7002489bcc7a1bb483cb068f5e94b7321a29865d2f2771c462e2c840d206fa418172484db3cc48d2017bd7930dcfe67ec75ca2c5ce6350bc540be61450e2c96a26c06a2392af72a9da2f3bb051c7445fad0d554e8196e7cea1253696f0718a3acb58684efb7934f097c7754a096883c50627eec2a371e836c51b647a9496f3960201fa39939e48e5cc8003d73cb489b358ee6e50432a5318f9a8a02f6112e588bce80044d6e4be4c383b2251d366a409af2eeb9bb8bea3a92f1de44dae8e391ce6043421af251ab4c996201e2d7b96d1fd8f964e6170468b687e0736e3b70dfbf20c02f955875ca0668be2157fb604e545bc5bfc62e66d0523d7e56bf4fdc18feda59e280e728bde763695dc8c0998160a657c40379646c1bd0e90b8be11978900adb617a74101281b178dc328dfeb9a107af550c455f26743615c7cd894ae700ef24ffef92088a0ab80041d1a4c9f9e8dcb2f3ca29613118c5459d2784bfef5aa8599fe1ca8b38525fe188e7494a5653cb955b7093e4957db2f54bca2514cd8a6981ff1c4f7a3a98288bace182a24d16ab595331efaca0790aefc8c602987a0ef586800dbedccf350ca1e6903a1aafac61c31e37470dac3d6ed5c2ce902e683274697d0ad208a0807e6acb23ea2c2a82a76cc5d616653938b59204499649e94bd243dea4e82728efb880588ec9bb00fe1c87107f53a2775b566bdcbd728234067e2a9109aa395078fcef08be6d72eb3e7ce19e9817f6a1fb2f6cbeea44d393f53f9871799dba626de157f8924deb83e4c2e331a9404ef3c30d0c5d71a005a748af3d351159b47db1b7f6a471fab588679cdcdd8ff59188b7aef37f0e0a70810a0d667fbb6be4a97dd93e4b867307d181e30e2c8268d6c1567ed3eeb946ed626d78507088351104bd3b3c3628c89cf1434485eee5414b3f7b4689c0bb1e2944a92d4d927e391a4a537cb5e4e53a58934ad45a7ea96c2bc6e1887600fda8edb76532f6a2d5ca961728a4b3766946cc8ecab15083b4295574f246b6040493239c5a925b05ffcaa4c20148f305df82318f7822b748115a29a6b379bb7669ad2236df8e10c47ebb4875fb0d7b790317c31d26f527d61ce3e4dc424741b9e1920f314b81bf0c90f9b3434b5d215f86a3b1f37ceea47e988df670ea5e54b624131daab4a4e2788a2f1a556c712e5458d1ee5a031e6ef353783a06ab201ea5e44e03a452b17f6dc4b8a378ec110cbc4f978bd13761c179e92fd7f07a66e4ba2c9feb97ec6d547890927b6882df5b067ca8009e6a1cdd5cb5e76b854ac2f2f9cf73bf9dd068446570fddb55f78b985b65851802216c1117cbdf7a330f9909ed799529a33b94644c3924a47e16c3115d5a37ff31830a9e6736ba5003ca2df08dab7e1456e84cb06cc32e53ed9d8df3a796b6d04a37a3e59cf5ac6b2dcce101b91867fc3084feb2b4f6fe196eb355604bb0845cdea8929c581b8c5775e4c0d03a0931700581807232a82594654aad1275941dbc81e8b8479522f632fc08dd616ae5d08cfdd5b0cd4966bfa6e6297aa6d38fdf141bb73bc551dc3ca665abc84ddbd6db05e4d82daf68ad9cd8a3039a38cd135729422144501775bb5aaea858dff701132b8110cfd34b07a39245e1d25f77080823d05acf9efdc8ef963e758f3ccca6825f494da741fea66a551d4d316774f474fc172aad45d45b127692f4eafa9655d616221f97dbcc83a088f80c3dd490507176ab9639b0e6a51ff5fafcfab1caa447aa6cb9d37b26ac47bf1d4f06541946386f57ab7e2b95be1e6dcf34274eaec5b00b8967754653d60fe6ce9a82d5f6f3610b4704df7d6c2122b4faf739665de4ae3bb2019f456212a193802a98474970d5b04ab6e214265c0d9a96ac00b11708b7aa171443ce475fc7c83434fbd340fd275ff5209cf8de9380666a5fe4f11080b215f399d800440d14b29173174150f3a9f83ce9fff3cc4c82691afa45441a5f129874c3e050e101390ea5fbc9a8569ab316a86fb54e6bc90e148ca43698838a25b2e8754d48292cd33502bfa3e3859e94ec5267ac9a9576d071003d5bd75bb308295ed8aa1b0a8d0e9b62b3f1a73a3de1b74d83e111c4fc6ba1035ef0f801204c195318eab25189107878da48012e72a4d614798730210e07dcf9d031f0139cf5d63fbfffd3ac839964555adc72a433edc23ce5789d02334042f657a4704f8c1d1436eb791ba690c5a0cbbe0896b095e3dfcebca0067c2c72b56dbe1b25f2b7853ca887675ee754bffb3814afb847dde8f1d1baf9d0b3e3cae5852546b4ebb8f957d4f3d351ffccacef19bfb020b194dd80ce8636201bc0648a976253515a9273af79cd6c32abf1d0f7b3c80cbae8381b94813d0b7573e7442507736d349e2717a0ec592cfea51b7fe43df75b1a1862ae316a144aaf1465c348e0cafd7fba60a489b470070548224f83749a7618eaa2ec4a4aa328c190c5e7ad33bb83e8a85d6972c81d673c29688ea182d5be67f009541c7422b7e88b411f5eee080714a7b0d1fe13bbbb85d68b63151a3b47b6f498891cf0ed05d43ecf0a3c59404572d88a4a1fd1c4b14510a2bc484f243c34d0c102c8ba70ac5fb0b686c09db67fd33af8404099a227c6a2c3db8ff46412347c3b16dcd816b30d1cf5b28f2f5f534e8df7d9626957015da6b3da8970180b3db85cb4406ca4714f732281a7d653261e155fd09f926dcb9842cd63f4b53fb99cc22042be665bd1828ea98c77a3c47923c39fd222b8c4fb42d54baf886a0356be31b5771cd189520b923571da4422e86baada8891cb32248ebc292864cbf81c5e735458d163b473d351da9b6a7dc9de90780d4b610e2af419d2c9c48da90d63da735b6401d27d6bc305377d0b55b97e31e215cc3c91b16ae1055e86120e81eb9cb34c9d2455c05650fcb70c635276029369fcb1e7e5ab0800613d6a7ce05ae78fa0ca319793c2e676318c43bf97401c3d651cea55e1a522fdd8d13f0f9ae5b7ae55efde54ba10d258c4baa0d560366435c17201569cd7fa6f90a65a07da0bd207827bba0647d1f40380f6f6c0e124884ac9d570eb2bd5b017d048d34d65eee9d6a3f93faf4c327447b4b582d1b2c065ac44575cfb45cdbab8d73ea4c48c437cc0f1ac91b3eda295af36a02134ada0c842673b1d5c10b4db51c84f249b9a04439a00785b5717f162405f20b3bfd72f5966e0e703d29ecfe71fc532c24f328a74b6c88391cc9e0990680116fedc011641f2019b0c505b0f7c00ee751bbb02a0c396a480472650dc507f46d8a766ed0c01a5fd57c641a46cd5ae834c4a70fdc89efd465636fc8b1e6c98c648eaae2864438fdd0a3d09b4faff1feec02dc69545a81c46b9395e78998dae4ef8302d07a1fa6f5f27edf21075a6b8d427cfcb00b7fd68ce5a8ef243a2ac393e9ad2b3481f7eaa81dc8b9bdb092704a64d3f45f52d59591bcc9e2b5bc82570de67096103d5b224dee449c94173f9271b90458735c4f4d1d76b34351208dac7ae89bdc423df920ac8db0f0b1aef004c630129a15ca8ee70af2b8b79f081f44e7449e70aeeb01258f9d117fdb4e399a50dc31568ff80bc2b9733a56a2e605275c951aa6603bbae3856aab64a81895c75b3b09f68ef57c483b788b7ddd9ad1b0e46605f6fddeb1c6e612d120268756b1ca86f3d736ef95a84fa563939f6183027792eb6b83adc5906fa81b745277f283f629ad683ab9c4ec6eb411c1f8710cdf4475bcb837003878a2202f5cb0fe37a930cc51a3ebef34ebdbbec4c43b276d6937fe09b1231134b5755703274ad4ba30d669917b31e3f9f1f74c3641f6eb18f5880e9fcc686116abe75f6228fc08ec60e421d66a456cb741814bd48f3da23cccdd1bc65b5cda9fac653d8c1d11d0c686b6e089197dff5d7147672e156dd0ee2913369c21ac5e4f3b8461006a74fb0a9c49747974ce9d896c65229805420293b5e6a9094d839652d0072f42eeb37e92939b46e2636a9807cafd4f85e93fd27388315d4f54d19a7aa3bcec4d4d882b4fed35d6afbe96421851ce6bc7439f3cab5ca3d5c2f0492b8604b7c0e28c809ed38056a3b6de942bf93219a9c4e555ec7e739465166d7a9fd9e4061e7a1671ef321ac795316ce24439a2c1a693946a76052c16bb43bf74ac0994c05723df0a0881569efba5198ead00091bd9c7cbd8309e479565137402751cf7c29a1cd191a6dc16e28bea0921c3e2da177af44ab194e3d0506824a7e56513ad33ff2af697980dca0f59177766dbb02b910e2db0573c935970640cbe9a74ea068e0f21ebc5ff41388de62bfb7382f4e1f74e43b627f7521882ba0b8ab22abfd75aa9be2c1d8294046eea017da9d3e37047bb73940e402a0d7b372324a064b8b358ae3f369830d639b944f8641f5f82849574a3ed56a7703732d3465eaa9868a7efe0eba392d8d7fc38d52c52e854ed4077f116857385c53015714a171a4f0e7f9cc50e6dfdeab3d9ae9e5ca463f7e8145c919c58b142a01681cc8c2f4b930b20b593c7b91bc127cfb30a9279af0954593924ebc3418e0bf8e88a6729c6533e70b1364d1943cbb4957143ce4e2dc6628aacd35b14439d86218c9f43220a5a3b84fb46d7a548e93e139da10b0f961950ee6bf8c3661d050145c8180b3a889b91268395357785126d6ac301e03ea19465e253c55118d7def5c9462db3935d892edb415a763fbf13583739592451f7696b40222f39fcce594f721f35455e58487f49aed3d88464d5c7e1ee0550a024fed5001b86c3ad078659e96f5565a5c36f9a06e596df18e86044b9abac4815fc3304cdc987e62da6258ebda54122afe83b25f56fbae0ca0306186176f7d4b5af21190ccf22af4e3f7173e437fdf32d3edd9aa401aadf24830030d5ed318a237164e5da8c7dd666f6c71dcba575fbdba5360d0c191bb06b61140f629c9e69fc54c085571a761ba205c23e49fb87b048ee06aa68a826eacd0475b84db7bd0c266744fcfd2b8eda411c4e1555cfe0617fbc9fad11468ed7ce6e9f5ba0416e329ae888a4acff4b610da8245a02d0d675e2b4bd8c287c7097e2beb4f4d8553136d4573f64455636a528d4a2e4a89f5e000ab60a169f404d25d194dc235fcc37acac3908741057dc8430c0f82f3745fbc3eb140f05640f3d7189ad48bfe6d09a51d928b7509255294d060f3b79c673b736fa40bb0a5f7788b403b03b2afca7a7becb82ccac6cb0e2", 0x1000, 0x101}], 0x2, &(0x7f0000003740)={[{@check_strict}, {@hide}, {@unhide}, {@hide}, {@block={'block', 0x3d, 0xc00}}], [{@fsuuid={'fsuuid', 0x3d, {[0x66, 0x63, 0x30, 0x33, 0x38, 0x5, 0x33, 0x62], 0x2d, [0x38, 0x39, 0x37, 0x36], 0x2d, [0x66, 0x62, 0x64, 0x34], 0x2d, [0x36, 0x38, 0x31, 0x36], 0x2d, [0x64, 0x61, 0x65, 0x32, 0x6, 0x33, 0x62, 0x37]}}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@euid_lt}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@appraise}, {@measure}]})
ioctl$VFAT_IOCTL_READDIR_SHORT(r5, 0x82307202, &(0x7f0000003800)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}])
sendfile(r3, r0, &(0x7f0000005000)=0x7fffffff, 0x8)
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r6, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r7]}}], 0x18}, 0x0)
sendmsg$sock(r7, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003a80)="23acf3046d3fd8d77a3249c746e181a21c21028d59563101eb2aece7e779a70d73d06b7d965d21a2f6080c270a3035f4c7d0b3aa0a67027a45b5627b578bd9d7f83ee0dc91e5910de9465fb9041ca2b19e85b32b8684d041f24ebdd740e50e7edededca012c13b3e90e0726604c295a576df68b76ce8e36a16c56944b211fc5b96089bd29cbb8d72a6d4dbb8fa3a159b48328556c0fafcc823262575bb0524042092e4", 0xa3}, {&(0x7f0000003b40)="64b2dbfbe9b768635ba17ff88b56b1bec534195bbc7d4a498d1889750a669a1b1f4ae0edce3c191f1c2ed5d7c66963e9c1b4855666439f32ee52ce364bcb97bd3afd1cb70baa721ac6ec9270a5a1dec75352893a89f9dfc76e7c505f02e1b4cd4a2caeac2032631dd1f00091f0f2cc02869bb96bc0a09dfca9852727087875726914646d2cf7fb", 0x87}, {&(0x7f0000003c00)="b11b086b31b34119dd4dd1703dc950031aaea7f5793550874b6f6349e3058187974d497cb8a9b7ea80962289ffa8f674e04ef094499ec17a3d44567e00deb6e7a7c343d23cde0cd7fc24e874079902", 0x4f}, {&(0x7f0000003c80)="77ce4270c3d94cb306dfa5b6023501", 0xf}, {&(0x7f0000003cc0)="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", 0x1000}, {&(0x7f0000004cc0)="91f43c4ce9f51de4b566bae8a3e5cf6d4bbef8be5841e61556de5ec7e7d110aec5d3446bf6ee9d429c1fa8ecdfa83d7f8f3c3c20b4293a2ca729f2480f72d2529e28f1d6380180a1f30d79bfc58d38b5ae250bfa4a4401cc3fdbd00af4b5ef601bae91a3af5f9786d58d262316cd908fc61b8486d4793c26caeb520d4fe25591bfa660f8045cdc4a6c83dad793c4fcf5445082af9d77cbe74b5d6a2a83783c9ce38a959ec01c3134a087f7e3b5097c8c688c80093cea344ca5d442e4067ae86d47b083d18b323b52deab859f3a85db52d6a25facece86eb40deeb777a53d345136", 0xe1}, {&(0x7f0000004dc0)="ff16b2ae4b2702cf55081036814ca38272b3eee0484362b678d91423c967b66fb247d2c2b0657149c38770034248fa3360bd24f1921c556bbc637fc65eb919070d89df", 0x43}, {&(0x7f0000004e40)="6448249b42aa15ecc3907610f20b0e54edb3313d5575315494a103a5ff34120464a9ca01524736e30d08ec5eccf416de807cd96cf7df60168dc2a21140f112f470a34b1b612b4b", 0x47}], 0x8, &(0x7f0000004f40)=[@txtime={{0x18, 0x1, 0x3d, 0x7ff}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffff}}, @txtime={{0x18, 0x1, 0x3d, 0x10001}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}], 0x60}, 0x40000)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:31:30 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:31:30 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc048d6c2, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2707.373152] loop2: detected capacity change from 0 to 215922
[ 2707.377323] 9pnet_fd: p9_fd_create_tcp (11033): problem connecting socket to 127.0.0.1
21:31:31 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x5500, 0x0)
21:31:31 executing program 7:
syz_read_part_table(0x696e5b3, 0x34b71, 0x0)
[ 2707.420636] loop2: detected capacity change from 0 to 215922
21:31:31 executing program 5:
syz_read_part_table(0x0, 0x1200, 0x0)
21:31:31 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, 0x0, 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:31:31 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0xf5, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"})
r3 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r4 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x40d}}, './file0\x00'})
recvfrom$inet(r5, &(0x7f00000003c0), 0x0, 0x2000, &(0x7f0000000400)={0x2, 0x4e21, @private=0xa010102}, 0x10)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:31:31 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2707.515558] loop4: detected capacity change from 0 to 215922
21:31:31 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x6800, 0x0)
21:31:31 executing program 5:
syz_read_part_table(0x0, 0x2000, 0x0)
21:31:31 executing program 7:
syz_read_part_table(0x696e5b3, 0x34b72, 0x0)
[ 2707.580815] 9pnet_fd: p9_fd_create_tcp (11049): problem connecting socket to 127.0.0.1
21:31:31 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:31:31 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0)
readahead(r3, 0xb2, 0x2)
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r4 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2707.640788] loop2: detected capacity change from 0 to 215922
21:31:31 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x696f, 0x0)
[ 2707.679717] loop2: detected capacity change from 0 to 215922
[ 2707.683083] blktrace: Concurrent blktraces are not allowed on sg0
[ 2707.701106] loop4: detected capacity change from 0 to 215922
21:31:48 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, 0x0, 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:31:48 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x6c00, 0x0)
21:31:48 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x48, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:31:48 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
open_by_handle_at(r0, &(0x7f00000000c0)=@orangefs_parent={0x28, 0x2, {{"61f6dca788b659ac408990b354ee9cc1"}, {"a3c6189f120e5bba4c12c377ad88196b", 0x5}}}, 0x305000)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
21:31:48 executing program 5:
syz_read_part_table(0x0, 0x3f00, 0x0)
21:31:48 executing program 7:
syz_read_part_table(0x696e5b3, 0x80000, 0x0)
21:31:48 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:31:48 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'veth1_vlan\x00'})
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2724.580846] 9pnet_fd: p9_fd_create_tcp (11087): problem connecting socket to 127.0.0.1
21:31:48 executing program 5:
syz_read_part_table(0x0, 0x4000, 0x0)
21:31:48 executing program 7:
syz_read_part_table(0x696e5b3, 0x900000, 0x0)
21:31:48 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x6f69, 0x0)
[ 2724.653181] loop2: detected capacity change from 0 to 215922
[ 2724.749884] blktrace: Concurrent blktraces are not allowed on sg0
[ 2724.756946] loop2: detected capacity change from 0 to 215922
[ 2724.759192] loop4: detected capacity change from 0 to 215922
21:32:03 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @rand_addr=0x64010102}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x8}}, {0x2, 0x0, @multicast2}, 0x65})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:03 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:03 executing program 5:
syz_read_part_table(0x0, 0x4800, 0x0)
21:32:03 executing program 0:
prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c)
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:03 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:32:03 executing program 7:
syz_read_part_table(0x696e5b3, 0xf0ffff, 0x0)
21:32:03 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x7400, 0x0)
21:32:03 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2740.098551] 9pnet_fd: p9_fd_create_tcp (11115): problem connecting socket to 127.0.0.1
[ 2740.216647] loop2: detected capacity change from 0 to 215922
[ 2740.267001] blktrace: Concurrent blktraces are not allowed on sg0
[ 2740.270255] blktrace: Concurrent blktraces are not allowed on sg0
[ 2740.276746] loop2: detected capacity change from 0 to 215922
21:32:03 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x83, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2740.330080] loop4: detected capacity change from 0 to 215922
21:32:04 executing program 7:
syz_read_part_table(0x696e5b3, 0x1000000, 0x0)
21:32:04 executing program 5:
syz_read_part_table(0x0, 0x4c00, 0x0)
21:32:04 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:32:04 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x7a00, 0x0)
21:32:04 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:04 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
r2 = perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x9, 0x40, 0x8, 0x0, 0x0, 0x3ff, 0x20, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5504, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x200, 0x7, 0xa3, 0x6, 0x9976, 0x4, 0x4, 0x0, 0x7f, 0x0, 0xfffffffffffff801}, 0x0, 0x9, r0, 0x1)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r6]}}], 0x18}, 0x0)
ioctl$FICLONE(r4, 0x40049409, r6)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r6, 0xc0189372, &(0x7f0000000500)={{0x1, 0x1, 0x18, r2, {0x3}}, './file0\x00'})
perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xf, 0x7, 0x0, 0x0, 0x0, 0x800, 0x40009, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000440), 0x1}, 0x6011, 0x554, 0x9, 0x0, 0x8, 0x8, 0x7, 0x0, 0x4, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r7, 0xa)
21:32:04 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x68, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2740.598600] 9pnet_fd: p9_fd_create_tcp (11148): problem connecting socket to 127.0.0.1
21:32:04 executing program 5:
syz_read_part_table(0x0, 0x6800, 0x0)
21:32:04 executing program 7:
syz_read_part_table(0x696e5b3, 0x2000000, 0x0)
[ 2740.679000] loop2: detected capacity change from 0 to 215922
[ 2740.697607] blktrace: Concurrent blktraces are not allowed on sg0
[ 2740.707079] blktrace: Concurrent blktraces are not allowed on sg0
[ 2740.758641] loop4: detected capacity change from 0 to 215922
[ 2740.856548] loop4: detected capacity change from 0 to 215922
21:32:22 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:32:22 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:22 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0)
bind$packet(r3, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x1, 0x5, 0x6, @remote}, 0x14)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:22 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x48, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:22 executing program 5:
syz_read_part_table(0x0, 0x6c00, 0x0)
21:32:22 executing program 7:
syz_read_part_table(0x696e5b3, 0x3000000, 0x0)
21:32:22 executing program 0:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
fcntl$getown(r0, 0x9)
lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0))
accept$inet6(r0, &(0x7f0000000580)={0xa, 0x0, 0x0, @dev}, &(0x7f00000005c0)=0x1c)
openat2$dir(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x6203, 0x88, 0xa}, 0x18)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'})
sendmsg$unix(r0, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)}, 0x840)
sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c041}, 0x4004000)
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r2 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r4 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:22 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x9000, 0x0)
[ 2758.680876] 9pnet_fd: p9_fd_create_tcp (11181): problem connecting socket to 127.0.0.1
[ 2758.690630] loop2: detected capacity change from 0 to 215922
21:32:22 executing program 7:
syz_read_part_table(0x696e5b3, 0x4000000, 0x0)
21:32:22 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xf000, 0x0)
21:32:22 executing program 5:
syz_read_part_table(0x0, 0x7400, 0x0)
[ 2758.804067] loop4: detected capacity change from 0 to 215922
[ 2758.841859] blktrace: Concurrent blktraces are not allowed on sg0
[ 2758.848739] loop2: detected capacity change from 0 to 215922
[ 2758.890757] loop4: detected capacity change from 0 to 215922
21:32:38 executing program 5:
syz_read_part_table(0x0, 0x7a00, 0x0)
21:32:38 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x100, 0x3, 0xfffffffffffffffc}, 0x0, 0xc, 0xffffffffffffffff, 0x1)
r2 = socket$inet6_icmp(0xa, 0x2, 0x3a)
ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000005c0)={{r2}, 0x3, 0x401, 0x3})
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r4 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x400000)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/74})
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x40581, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r6, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0)
getsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000000540)={@private, @private}, &(0x7f0000000580)=0xc)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f00000004c0)={0x1, 0x40000000, 0x0, {0x173b, 0x7}, 0x6, 0x8})
21:32:38 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0)
statx(r3, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:32:38 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x74, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:38 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r2 = clone3(&(0x7f0000004c00)={0xc0000500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
capset(&(0x7f0000000000)={0x20080522, r2}, &(0x7f0000000040)={0xfffffff9, 0xe385, 0x200, 0x9, 0x80000, 0x7f})
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0xfffffffffffffffa}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:38 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xfeff, 0x0)
21:32:38 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:38 executing program 7:
syz_read_part_table(0x696e5b3, 0x5000000, 0x0)
[ 2774.509966] 9pnet_fd: p9_fd_create_tcp (11206): problem connecting socket to 127.0.0.1
21:32:38 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xff0f, 0x0)
21:32:38 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = inotify_init()
fstat(r1, &(0x7f00000003c0))
r2 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
chdir(&(0x7f0000000480)='./file0\x00')
r4 = socket$inet_udp(0x2, 0x2, 0x0)
syz_io_uring_complete(0x0)
ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x221})
setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000440)=0x2, 0x4)
r5 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f00000000c0)={'wlan1\x00'})
ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:38 executing program 7:
syz_read_part_table(0x696e5b3, 0x6000000, 0x0)
21:32:38 executing program 5:
syz_read_part_table(0x0, 0xf000, 0x0)
[ 2774.632037] blktrace: Concurrent blktraces are not allowed on sg0
[ 2774.652964] loop2: detected capacity change from 0 to 215922
[ 2774.661989] loop4: detected capacity change from 0 to 215922
[ 2774.699104] loop2: detected capacity change from 0 to 215922
21:32:38 executing program 7:
syz_read_part_table(0x696e5b3, 0x7000000, 0x0)
21:32:38 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r3, {0x401}}, '.\x00'})
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r4 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$TIOCL_SETVESABLANK(r0, 0x541c, &(0x7f00000000c0))
ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:38 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xfffe, 0x0)
21:32:38 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:38 executing program 5:
syz_read_part_table(0x0, 0xfeff, 0x0)
21:32:38 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x68, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2774.901816] loop2: detected capacity change from 0 to 215922
[ 2774.949786] blktrace: Concurrent blktraces are not allowed on sg0
[ 2774.969797] loop2: detected capacity change from 0 to 215922
[ 2774.979010] loop4: detected capacity change from 0 to 215922
[ 2775.076562] loop4: detected capacity change from 0 to 215922
21:32:54 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xf0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:54 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:54 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x1f, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:54 executing program 7:
syz_read_part_table(0x696e5b3, 0x8000000, 0x0)
21:32:54 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x34b6a, 0x0)
21:32:54 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:54 executing program 5:
syz_read_part_table(0x0, 0xfffe, 0x0)
21:32:54 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0)
statx(r3, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
[ 2790.757259] 9pnet_fd: p9_fd_create_tcp (11276): problem connecting socket to 127.0.0.1
21:32:54 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
r3 = eventfd2(0x3f, 0x800)
ioctl$int_in(r3, 0x5452, &(0x7f00000000c0)=0x7)
21:32:54 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x34b71, 0x0)
[ 2790.798256] blktrace: Concurrent blktraces are not allowed on sg0
[ 2790.801469] loop2: detected capacity change from 0 to 215922
[ 2790.831820] loop4: detected capacity change from 0 to 215922
[ 2790.838074] loop2: detected capacity change from 0 to 215922
21:32:54 executing program 5:
syz_read_part_table(0x0, 0x80000, 0x0)
21:32:54 executing program 7:
syz_read_part_table(0x696e5b3, 0x9000000, 0x0)
21:32:54 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
r2 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e23, @dev}, {0x2, 0x0, @dev}, {0x2, 0x4e20, @remote}, 0x24})
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000440)=ANY=[@ANYBLOB="020000000100000018000000", @ANYRES32=r0, @ANYBLOB="bd2b0000000000002e2f66696c653000"])
perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0xff, 0x2, 0x1, 0x82, 0x0, 0x9, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f00000000c0), 0x5}, 0x8800, 0x20, 0xffffffff, 0x2, 0x2, 0x4, 0x4, 0x0, 0x2, 0x0, 0x401}, 0x0, 0xb, r4, 0xc)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r6]}}], 0x18}, 0x0)
openat$cgroup_int(r6, &(0x7f0000000480)='io.latency\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2, 0xf9, 0x40, 0x14, 0x0, 0x81, 0x1020, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000004c0), 0xb}, 0x108, 0x0, 0x1f, 0x9, 0x6, 0x7, 0xfff, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x1, r0, 0xa)
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
syz_open_dev$ptys(0xc, 0x3, 0x1)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:54 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa00, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:54 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x74, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:54 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x34b72, 0x0)
21:32:54 executing program 5:
syz_read_part_table(0x0, 0x400000, 0x0)
21:32:54 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
readahead(r0, 0x4a5e8000000, 0xc1b)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0})
sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, r4, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r5}, @void}}}, 0x1c}}, 0x0)
r6 = socket$nl_generic(0x10, 0x3, 0x10)
r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0})
sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, r7, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r8}, @void}}}, 0x1c}}, 0x0)
sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r4, 0x100, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x1, 0x51}}}}, [@NL80211_ATTR_MAC={0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000000)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:32:54 executing program 7:
syz_read_part_table(0x696e5b3, 0xa000000, 0x0)
[ 2791.089040] loop4: detected capacity change from 0 to 215922
21:32:54 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x80000, 0x0)
[ 2791.128240] blktrace: Concurrent blktraces are not allowed on sg0
[ 2791.136342] loop2: detected capacity change from 0 to 215922
21:32:54 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r3 = socket$nl_netfilter(0x10, 0x3, 0xc)
r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0)
sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000448bd70000800df25200000000c009900e34efe00190000000aeab0a08ae9a67712dc5aaecf6515a1a57e083482723014f2f588fa906e713e83846c74a30c429ff2c23fa0f71dbbeaf7aceedc52e35110899f65e836c2f1958a5e503e16ba63e04978e0a20a6fb83ff3688d21a676d36b04b4702e9ccc2cdde1c45803a44290f3ed28928b1baf240d436b5741aeec37071b3e86"], 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000004)
ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'ip6tnl0\x00'})
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0xcf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2791.247831] loop2: detected capacity change from 0 to 215922
21:33:12 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3f00, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:33:12 executing program 7:
syz_read_part_table(0x696e5b3, 0xd000000, 0x0)
21:33:12 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
r2 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000101000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00'])
ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0)
ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
openat(r2, &(0x7f00000003c0)='./file0\x00', 0x145000, 0x28)
21:33:12 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x6, 0x2b0902)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x18, 0x3f9, 0x100, 0x70bd2a, 0x25dfdbfc, {0x1}, ["", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x40}, 0x1000)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f00000003c0)={0x2, "04f87f699c26e0ae67b7170387d0e8f232b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4d52c96042ae42b1a67d48e29854f68fdc8de823041613000000000000dd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b0115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fca186b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8baf7d91784d118de5b0b7d5c59fee3a1becf5cf8a7bbc8f31370631bd591ce0024c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0530cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a157a21dbfed600"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @rand_addr=0x64010100}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0)
ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'})
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, r0, 0x2)
ioctl$int_in(r5, 0x5421, &(0x7f0000000200)=0x9df)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:33:12 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x900000, 0x0)
21:33:12 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:33:12 executing program 5:
syz_read_part_table(0x0, 0xf0ffff, 0x0)
21:33:12 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0)
statx(r3, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:33:12 executing program 5:
syz_read_part_table(0x0, 0x1000000, 0x0)
[ 2808.500761] blktrace: Concurrent blktraces are not allowed on sg0
[ 2808.506288] blktrace: Concurrent blktraces are not allowed on sg0
[ 2808.509711] loop2: detected capacity change from 0 to 215922
[ 2808.529063] 9pnet_fd: p9_fd_create_tcp (11358): problem connecting socket to 127.0.0.1
[ 2808.539987] loop4: detected capacity change from 0 to 215922
21:33:12 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
lstat(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0})
lchown(&(0x7f0000000140)='./file0\x00', r4, 0x0)
mount$cgroup(0x0, &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300), 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB='n,smackfsh#\x00,rootcontexter>\x00'/41, @ANYRESDEC=r4, @ANYBLOB="2c024f470d616973652c687a73682c00"])
creat(0x0, 0x120)
r5 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2)
ioctl$SCSI_IOCTL_SYNC(r5, 0x4)
sendfile(r5, r2, &(0x7f0000000000)=0x200, 0x0)
ioctl$SG_GET_NUM_WAITING(r3, 0x227d, &(0x7f0000000100))
r6 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2)
ioctl$SCSI_IOCTL_SYNC(r6, 0x4)
ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4)
21:33:12 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@private0, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000700)=0xe8)
stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0})
setresuid(0x0, r4, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f00000003c0)='./file0\x00', 0x9, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000400)="0a7b9770c187ef6424d36145d012c4c6a3cfc023a07005f04b251bdac223451839c76af345e533eb67da28a1f94beaf7cd31a7310037a3c798e45b631a2df5af4948416cfc4a4c2aad9a7bbd2a6c0f2c946ea8b4cc2d6e09922986178e457867cedb9b867f8759fa9e0e7b5c7c32227c370c1f4d32319797996180ec5616700a9e7eeac437ebd04d8b31f6a83bfe10e4ca164611471c07a7", 0x98, 0x100000001}, {&(0x7f00000004c0)="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", 0xfa, 0x7}], 0x60040, &(0x7f0000000740)={[], [{@euid_gt={'euid>', r3}}, {@fowner_gt={'fowner>', r4}}]})
r5 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r6, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r7]}}], 0x18}, 0x0)
bind$inet6(r7, &(0x7f0000000780)={0xa, 0x4e21, 0x1e7d, @rand_addr=' \x01\x00', 0x1ff}, 0x1c)
21:33:12 executing program 7:
syz_read_part_table(0x696e5b3, 0xf000000, 0x0)
[ 2808.611228] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO
[ 2808.614796] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO
[ 2808.686656] loop4: detected capacity change from 0 to 215922
[ 2808.741775] loop2: detected capacity change from 0 to 215922
21:33:29 executing program 5:
syz_read_part_table(0x0, 0x2000000, 0x0)
21:33:29 executing program 7:
syz_read_part_table(0x696e5b3, 0x11000000, 0x0)
21:33:29 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:33:29 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xf0, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:33:29 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1400000000000a0000000001000000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0)
openat(r3, &(0x7f00000000c0)='./file0\x00', 0x2801, 0x48)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:33:29 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4800, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:33:29 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xb}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:33:29 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xf0ffff, 0x0)
[ 2826.394133] 9pnet_fd: p9_fd_create_tcp (11386): problem connecting socket to 127.0.0.1
[ 2826.422601] loop2: detected capacity change from 0 to 215922
21:33:30 executing program 5:
syz_read_part_table(0x0, 0x3000000, 0x0)
21:33:30 executing program 7:
syz_read_part_table(0x696e5b3, 0x12000000, 0x0)
21:33:30 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x1000000, 0x0)
21:33:30 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f00000000c0)={0x0, 0x0, 0x9, 0x11, 0x55, &(0x7f00000003c0)="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"})
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2826.484535] loop4: detected capacity change from 0 to 215922
[ 2826.502782] blktrace: Concurrent blktraces are not allowed on sg0
21:33:30 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$CDROM_SET_OPTIONS(r0, 0x5320, 0xa)
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x40309439, &(0x7f00000000c0)={0x2, 0x1, 0xc})
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2826.539691] loop2: detected capacity change from 0 to 215922
21:33:30 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x2000000, 0x0)
21:33:30 executing program 7:
syz_read_part_table(0x696e5b3, 0x20000000, 0x0)
21:33:30 executing program 5:
syz_read_part_table(0x0, 0x4000000, 0x0)
21:33:30 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa00, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:33:30 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x460000)
ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r3, 0x5000943f, &(0x7f0000000480)={{r0}, 0x0, 0x10, @inherit={0x98, &(0x7f00000003c0)={0x0, 0xa, 0x7, 0x800, {0x2e, 0x2ce8, 0x7, 0x1ffe00, 0x6}, [0x1, 0x1, 0x1000, 0x80000000, 0x518e, 0x3ff, 0x8, 0x6, 0xc2c, 0xf0]}}, @name="8dee487bdfe838236aef10ede579772d277533c8962eea57f8b436e2abba9510231778bf126fdd6a2b91a920f0a2da240b76d64fa2c3cef8f1074217b26f7e83e49f8d598f3ca2990e29fdb6b32b8b262945cc8bc3ca2530b2bcba7a195e50695cb806130426966ad423eedcc3d120fe4de7701eb003762427d3aa7b33d00c7f1e9532a66e7fe89d2adc10310ed77b7cefb6cb97baf877a24dba76a76ebf4192c2da38b3c1e31b8436024672183dee1c69edbb4e374bf94fe7f881ad7423237d08b33e1377c4fabfd68597f7ddce6d2781b13da4e76b2361ba8f28ed48ee57d4017a8a75f780835e7a7ed26050b1a32b2e918d1e625b4becfe66f7a3cebae4e887bdfbfd8bd83c5941719b5c5c181752e67c037ae2faed3b4be5cb343206a22999ceb0c7a70b5acf5d21908a6532331c476ba92472fd47b9a33390e0044ff33481ce9ca999d535bc34a52221d7f0cff599193df9e5e718012bc5f78c4c7097d44cc32218550bb084ffd964fe1f355766113e6ab19c201d3b028cf2da66e08edf19f487488bf26a2fe6870bd566fdc17d73e072f2395e7020b4e2e0c13ace147e6b7af0087956357adfffb1bd0a33ae2d256b2392524eedf592f2d0c58e80f3e53d983f5be6038ef33b1c2ba6b0e6989fab25908c85f725c390d3ad4c105daac8f8c037b11124647c7a6dfeca136e95bd8e4a5024accef7ff236f68a9f8ff93d2f9eb9613fc7370693b919e623d143c1baeb47003c30bca969e1335b68de0e18d2c4481a3f949c10914c06817f47fbda7c598655a00c76a959a19d24689199139b05f452935fb6a0164d75ee31057fdf2f4e5befb812e59317357520ca0cd9e5ce3e1951de11e0a83f03bb2dd06c49ebf497f8cb9473f62a83935bc10b9b4467a7e8afe7d20798b48ccabace27c40049a56f0432a0c59eb5b37289ebe44e481a51c003a022edbf87e4ab29994edc5f53dc33805b4d29e87e736997acb1b5b9c0be52b7e28b9e9b8c11881cf9396af7e40ccaeb7ef5e5c27b5c7e5985f76bc66b734ddcbff0c6e954fa0a005bc238cda9a7ec358f1aa88c7b137f0156d8954005797c7fd1107c7532e0169e181e6e71bfdbfb539ce5ff6c25761bd3f1285619144cfedc7e7c7becaa01b350a1384fb07633f6ae9680e1dab7b983dadb0054b53be224f0d5cdb8426e4136c7a22f72d44bfca3e7da88580e769675c7b2d9ef53f84afefe24ad3be879ba30eb4af24b72085d9e75c7717cf595568bc70e5e3a8ed378dfa4733c5a20fbfcacabf2143ecd18ee627ae717a68332e7b5c8cb13170758668f29add0041152000594a76ae14da1abf59fa1fe946dc2344423fe60484994200e6505abf822386c19b989a0173c2ae4a50dc1b49d625ba4e0b5b3574258f973554f742e2c88c0d3dd3bbfe5d373ad998a7d0055d7c8e4a3280623f8b370b45146fcbd148df03a6b1e8ae20a1388226c2bb5a505ff4bde521d22f7001d9cc5995ff1020d1eeeafd748d63f0f91e003d6960794cdfec825a74c9811b702fc3ff24761cfa8d739a25e99708c01f9a08e2087273ba2ad38349537c1572218b003eaa61517a1bf5e922fb06beb841da10ee391ff2a6559e5426aed8c5428f06454dc95b8b56c1d8d96e15d1d46564a14fb2d0f25448fa2f37a9d99c10493ad42682ed2b51e36de56a9806d9409d082f62696b26ee1c0c5a7288775365ea444d71befc5576dc3ef4c9cd5ff71f45aaa244e3c18d9f989a222b5dbb7dac514f48ee403848cefd95d41ef266faedd87679bfe588797f039bce24c336db9100e3dedd56dad2a9fee056fbd8fdcc154f048075ce7d19239e6fcfc73a402cb4ca7c3e43675141e4133918b6d667f065c61f7f1a99084def6f7cf8a3b1e20ceddaac60d5341b355f85ba743c22fb7985a4a84ac941c37c68c6835525d115fe05911520f2a0a906837a827e0184b335fdfc5a3d89c0f3e42fb170dd4d4bdf3b194419d31ee0db0007ba65203e6f5bb9eb4a3d966984b7b3c39a746d5471acc381d9b0b7607102dd4f30cc20144b1653be08767f93f0c06bd3d763544ed1f48106de9248b312594e70c1da94f515972c028aa164d24aa659cd8eab974a328acfdc03ed98dad1dd09c0653aa9e1f5277b9fef3e20d6d468e6ba4866c8039a4ef2ac1f48ebff27d822577f44b1ee241d80524014bef99cb0d5f29345bd793f1a3cb219d49ec376b5ce74e320935589d5d8c7b53d3fec8db82e5d2dea5ed205e1c226daebae1750ee008fd2380906e0849d0a4b12e7396edceb3abd0249bf6fa35db910dbb390ddb08e4db0a686fbd7bac41fa6ca9746b55b0356e36f3f642356e2a5ffd627961fbf0404019f5bdac1d9432b12631a108740554ce6a7e77ab339dcd55c7900968efbd3ae510d0e923d09b483a174b99a69e475987a034f6a68c82bc6e09476be3d5112e5eecd4d774ad8b33a47b8a237ed324cf5c65f2fbaa4ee5d6e9191e7b19ca631af8e67850560045e3440a43d4baac43251ba947253bb9138c4d9c364a3c3ffbac9272ed06009738f90b44eab546a4ec63e63dab73a6677836a968d857cf6f226b130880f8ad8363a815dbc1982850354670f054cf01107822a16fd2c7f25d6862bf202095038ffcf9a9c53aa949fca6d032aa05ccc3cbc169dee29ef3d144085e91b13fd22bd3bb8adbd9151820ef7d42dbd7f6ec03c036e8e9be50dff98f73f1790fb2615cb13bca8c57ff1c19e6cae7481f9430cbdcdc71dd872394e2bbda0db075ae409762cbe817ea74342590a639a31a632e0a83c0e4698c26659436f68f01af804d41d9dc628201d1d36b22281c356cc1a995785f1f8541bd68313ed39075ae69e9f165edaa7ab28fb6b695069cb23fcbbf7b2238537e5f805af4d8814621edba9bd690e50413b595655642ed3922d7c7da1558b7a6d22fd02beaeb9bf8819f8cfcdd292790d0cfb60d0224fbfb55dc8d24215a8123e6ff596eb608ec3baa2b8e741178ca6716937d300e80b91cf91bb05a39f2babeee38752d26cc221ed48dc8e81e9bc0e56b2ac238cede932192fd88d3c3df9eed2825c54c738dc6bb84d50d5f89615ca24cbdad19bb8c6546d02efcd2bf68d399793749641af9efb80ad8aff24915ad8122fbfaca72b16f75edd501a54add3e5cf5d323720f2e8571441b8a20a9a6c5bb51030091cb547c64c5f595c272b0043c5fe48b43cf5b6268263b1a7db739ab0045b6e2b5ec4683a1fae426051d8f3343621abbe89673cfebbd9328ef90066a727ac9f926e94c3208e656e46118695d431d5b11794a67614c2607bf3c77a08c6c226c535eff1fbae85e848b274bc2f000b9ff3acfd7654ff4e1ce2ce334673dd53e3ad4140af92e07e4e140ba2d350518034ceda9700a3d5b8fe611b0f172fbb603c8edcbd21320084c70016f4f96c27a5e43829197e149b63a13e636673777b4b8e9bded9ca8d447abd9941e6ff1840e122f85af6723ef247700b40062bc528d6ea3e08360b1da2262109573ce0a7f8c63c1ffdc1e7b0001372da72d7906581a360aeb54618c7151493af79de0e09fbf69a1e2fa113f55f5747856e273be8a80844ef0953a9a42ba77ca6be64a93ab7897695bd571c6443417a934cd67e9774b3de64ed1893cad62f610c1237350fac40e913f9d6ddfcb33a876a4263af4cbdf54ff3e8cab6283a6b8f7a144a4c6b001addfd4848dc2a02096b86e8c9d396d7ac339a5f164de020224ad8d98056ccabc34ce85d8fc8c4f5fe5af8d275b124918cda8b233fc6d43502347b03709b919ddd5e3e4d8b77e0ba1a7d97cee887727a33a044084c693dc9f82b7481780e86b5eb4024863e688e47e633a5db5972a68aa918f5f84202030e840276afe032d6b30c5d3d1174f82c0aeb02af8b40f9effeaa735fabeaab1aca30ebff17afd17e3803ffb575ed23847f636568a710f3d92dc7d16cbae7686863614615b165b5757f3c7ddb31b9f2a425d8327cca4fbf814ce748233ce86e14c3209295e7f9aa6466d1e51685e001ebde18e70416ada490c4bd70f22fae1ea4481393e3916e64f211bc3e0330dd80ddab9e1c365687e5fd6f5c88095c0cb0174ab04bccd8c0bc08cdf858f124c6524b9cfa55d8d1d9e7fef35762df56f152e8535a6ca00a580a8656663ef220cab5da96957e28427d796153c3a3932d3e862565a362300c8a18887d19274d417fa0688be6daf9a7c7ececda9998826536d1480c96fb3f48aea9c427bf77f38df9e6d7bc0ce51d86c60fed37f09b3afa32a7f9b1d2ec19a484ad2094e2e29d7929ff467d6b6e4f658a274cc9c69fde8f407a67fe3dfda74fa72933ba4fbf2b632c265aafd46d861cdc2ade4b6a7b85113dd694ca46e289b9abf7b748890646e424996f2735fb056d775f2b07c77f9a5c9ea8170072c760e224b69f875fdba09443a47dfb9099010bcd570cfb56ac4756d982ac852844db9affc29d87e6f146617871f459c54397a3575731bbab5d460ab891297bfe06671006e8943edd6a5bb534ed0623dac5af04b9a4c87ca55a26bcd7f2f046251092728fe9797b30c0ebdb0a69882ed1294bf9e020f034b1b487638f60c18ad5beb379fd9397af2681f5112efac647678ecdb4f9d33a51014b9a3253cd1cdaf087e98e2157accb952ee8c5721262132f69ba022bf727543527ebeae267c93ea9dfefc77410dd370aeb251cf8cec14e32e3d800c14db3ddd245b86e653035deb14a1c674eb3deeaa9a78cfa0a6ae180cdf66dcab29af662bce8b1308f3f639f133412b53ef5972f077df5887f22287a66db6f70d6fde46658cb9588fcab07df42a54a67c042d6497931dd00487ea884b7a40f2a59810e84d0092e2ecf8c3415ec5b2b914dbbbd02a1c1e3270ba3704163021d14b497ad51aed09a0ad3d93619b6bd571d68acb684baa88b043db59e8e625c671a588d59d6043a1df88c22b4397a9d020bb5e8eee88da2d94db6dafcbbdfae908d60fc87ef1205d8e664164d21b3079826bf8029a190f36b65e82e64b15818ca670782ab6f6e285c274b977805765f76441bb474417b82696b8a4af2b018a286b7b361ea76d08c505cee41db5749712b87a986757254c6d2b1543ded42c4cfd0e2763ceacf86e3a2bfa1041cb36ce79bf177d22fd8445a62db30d5bcce0e629a9ddd8abe5dcee50c3502e72165770d2a16990ab83425832fc2ae565adb4cc9c227919f8d41c4fe421bd7dd49ee67415dba2211ca978b16ee52c73eb46910f1c8a2f079c385823c1e81cf22a4e309c4e542cb531e0d2d4f65ddae51d4c6b2b8c8247575a80c3002ff6487e93ac6d33df666dcf5143fc74a9b9569807b797d12405963e6a49946d3ad91dfdf56fac247be9776f43a65596dbb0cd46a3928e6630c52cb87fccefcb6b04357d9748ac2eb8b595181fedc305a046790d4c6492fc15856650be826f602e6f8cb4cd5c86ecc1c844a4b1011f7c59e7e57b48842e61726255be4d776bdeff8267f7017dec9ae5ef13a230780fe6ea914d103184b1d26e9c7e89f26650030444542f91465aefe2a0faebac2c949f4020503c3355349500dec644de78b79ddf294f3e4350c26683010da708a37e851f94d85b85d16e5d50b0f55187386803d477d912adec79e23a7069887a9ca0278c49da4f79d0abf7835bb40afb977d9c2d76188b630166cfc1f89664bbe213e0e0348e22f6ef26ae36850e8eb"})
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2826.808767] loop2: detected capacity change from 0 to 215922
[ 2826.877965] blktrace: Concurrent blktraces are not allowed on sg0
[ 2826.879843] loop2: detected capacity change from 0 to 215922
21:33:46 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:33:46 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$RTC_IRQP_SET(r3, 0x4008700c, 0x1091)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:33:46 executing program 5:
syz_read_part_table(0x0, 0x5000000, 0x0)
21:33:46 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c00, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:33:46 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x3000000, 0x0)
21:33:46 executing program 7:
syz_read_part_table(0x696e5b3, 0x2ccf95a6, 0x0)
21:33:46 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x0, 0x0, 0xffff})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:33:46 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3f00, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2842.699571] blktrace: Concurrent blktraces are not allowed on sg0
[ 2842.750100] 9pnet_fd: p9_fd_create_tcp (11445): problem connecting socket to 127.0.0.1
21:33:46 executing program 5:
syz_read_part_table(0x0, 0x6000000, 0x0)
21:33:46 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x4000000, 0x0)
[ 2842.819019] loop2: detected capacity change from 0 to 215922
21:33:46 executing program 7:
syz_read_part_table(0x696e5b3, 0x3f000000, 0x0)
21:33:46 executing program 5:
syz_read_part_table(0x0, 0x7000000, 0x0)
[ 2842.883310] loop4: detected capacity change from 0 to 215922
21:33:46 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x5000000, 0x0)
[ 2842.925539] loop2: detected capacity change from 0 to 215922
21:34:02 executing program 7:
syz_read_part_table(0x696e5b3, 0x40000000, 0x0)
21:34:02 executing program 5:
syz_read_part_table(0x0, 0x10000000, 0x0)
21:34:02 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0)
sendmsg$sock(r2, &(0x7f0000000440)={&(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}, 'veth1_vlan\x00'}}, 0x80, &(0x7f00000000c0)}, 0x48000)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:34:02 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6800, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:34:02 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4800, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:34:02 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x6000000, 0x0)
21:34:02 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0)
r6 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0, 0x0})
ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000006c0)={{}, r7, 0x0, @inherit={0x60, &(0x7f0000000640)=ANY=[@ANYBLOB="030000000000000000000000000000000000e000000000000000000000000000070000000000000000000000000000000600000000000000ff00"/72]}, @subvolid=0x1})
setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000016c0)={0x6, {{0xa, 0x4e24, 0x9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xf73}}}, 0x88)
ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r3, 0x5000943f, &(0x7f0000000440)={{r5}, r7, 0x2, @inherit={0x68, &(0x7f00000003c0)={0x1, 0x4, 0x40000, 0x3, {0x8, 0x0, 0x0, 0x5, 0x80000001}, [0xd796, 0x200, 0xb8, 0x8]}}, @subvolid=0x8})
21:34:02 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
statx(r4, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:34:02 executing program 5:
syz_read_part_table(0x0, 0x12000000, 0x0)
21:34:02 executing program 7:
syz_read_part_table(0x696e5b3, 0x48000000, 0x0)
[ 2858.992500] 9pnet_fd: p9_fd_create_tcp (11495): problem connecting socket to 127.0.0.1
[ 2859.080043] loop2: detected capacity change from 0 to 215922
[ 2859.129565] loop2: detected capacity change from 0 to 215922
21:34:02 executing program 3:
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0xfd, 0x3, 0xff, 0x0, 0xfffbfffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x2, @perf_config_ext={0x5, 0x3}, 0x0, 0x200, 0x3, 0x6, 0x1000, 0x1}, 0x0, 0x4, 0xffffffffffffffff, 0x1)
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:34:02 executing program 7:
syz_read_part_table(0x696e5b3, 0x4c000000, 0x0)
21:34:02 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x7000000, 0x0)
[ 2859.177970] blktrace: Concurrent blktraces are not allowed on sg0
21:34:02 executing program 5:
syz_read_part_table(0x0, 0x20000000, 0x0)
21:34:02 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r3, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18}, 0x0)
ioctl$F2FS_IOC_DEFRAGMENT(r3, 0xc010f508, &(0x7f00000000c0)={0x7, 0x9})
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:34:02 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c00, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2859.234810] loop4: detected capacity change from 0 to 215922
21:34:02 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x2000000, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
pwritev(r1, &(0x7f0000000880)=[{&(0x7f00000003c0)="3c1f3579f1bd7bad7a60b8ccc7df5d43d9de1dab64722f18fc43dafe9ce69de55fed68a6a59ee4e33c3b491eed0ecabe3cd3f3bfae27bad0f34545da4373d666fb1be37d25d7172368f73339dfcb02dbeec7a97b7c786b8fe2d18e188b75ae56510a867b3bb6237b94c3857fdb60d4ab59d5cc08", 0x74}, {&(0x7f0000000440)="e86944ddb0ba6de2bbc2cb0663a121ea65175b399532fdfa8e217c825f6cdc78fb8e5e805628d86ab7859699081aae84d76bcc79d0c39f34dfd67832e296f4dd066a871324c9d2ad6c79cf4cdc3fbe9faae6e6d9f0d23602d9a02691b8ba57e7fbdbc4b004ec8c1ca4b426152909f301de4fc63f65968c5fbaecd47a150e68641a6f34fdac39a610c82459631a0d578e589fcadc72c6d4cf873385ced304f5a3039cb74807f5af9c64f405c7d477ef6e79010d087cb7df63a33c36e1d927eb60736a18c1c55eb92a8196b40d4f0504040cfb5a66ac5b05d8e1cced39bdc2f5cfc31256ecad8b3e7a9b", 0xe9}, {&(0x7f0000000540)="c2f3b5b02552522239c6b63d3518baa40d911bff80000a749bee4b62d8b1ee31643c579c9b3d4b7dd35abf283a51e22bca1cd47ed2052ca8bb52cad7b8584ffa5d7da8fd42a6ec94eedda74dc2f49868496a140b9a30c7d4c2022d2be7df612daedb396aaa6c81551062311caf20ae5c57bbec97862a09f7678d3c6f45d69dec2fd81f88ebb6e7d5fb5734e6e0350c4a8de71f5e32f411e552798fc3541141115030a146636c5e3e62ad35a40177e99878e6487ac446956597faf5c9", 0xbc}, {&(0x7f0000000600)="c2b3d77cc1498350515795dcd07239f99e977528a0cfc25eae8a0ea031a01e3b26bf1b326c166224446d6e2686c4cdc5ea56c9f203588558a6f4858f7a140001672b7a3ea34a23cb22b48ce882537ab3db203423ceac692d50be20639b9c2280604aac76fe3cbb492861aab80a9eaca5aedf8cf62790e08326c14730252455346050a134f8e7c93966878755a5c68001ca76d6e837e01435041f648bfe9ecc7b14a3008d8fa05db547b022d6d984bdab6a607ac421d4ef4932107d45ecdf7a2712fe78a651afe1639e296588", 0xcc}, {&(0x7f0000000700)="59fc590b511b164a363dfed4c1eb6b76ce14653c6bf7cafe6de1a9f1ad6e99cc4423a8440da8b1ea7f8307355aa21ed0c3c5d83686f260ab208638cefdcf6a9315857d0bbe789d0e33553ee3b28084994f22a78a7706ef9601c344166e5a1e7599513428804ddb4a5fd07d147feeaa1d31dff8ad584ba32262ca6cc95517ad99cfd56b201d413f016cd21763284d765841875210a39cd0ba71a9089d8307d8d2035988360de968547d0f861ad53aa053b9f4b4e4900322ea463081c61f12f2128f", 0xc1}, {&(0x7f0000000800)="71f70a3db6e6f1c601f03bf73cc4bd2c860e8a32366ecad6a1c116597189a6bf000d90abd15135fc84af8a73ee0fa6b8175f5f1f6c1d8ccfa5803ec1a5f12ed2f77957db8a1f", 0x46}], 0x6, 0x9, 0xca2d)
21:34:03 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x8000000, 0x0)
21:34:03 executing program 7:
syz_read_part_table(0x696e5b3, 0x55000000, 0x0)
21:34:03 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c00, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2859.427267] loop2: detected capacity change from 0 to 215922
[ 2859.466993] blktrace: Concurrent blktraces are not allowed on sg0
[ 2859.470149] loop2: detected capacity change from 0 to 215922
[ 2859.472537] blktrace: Concurrent blktraces are not allowed on sg0
[ 2859.500078] loop4: detected capacity change from 0 to 215922
21:34:20 executing program 5:
syz_read_part_table(0x0, 0x2ccf95a6, 0x0)
21:34:20 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000000c0))
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
r4 = socket$packet(0x11, 0x2, 0x300)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0})
r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_RINGS_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x28, r6, 0xd0b, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX={0x8}, @ETHTOOL_A_RINGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x28}}, 0x0)
setsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f00000003c0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, r5}, 0xc)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:34:20 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0))
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0)
statx(r3, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:34:20 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7400, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:34:20 executing program 7:
syz_read_part_table(0x696e5b3, 0x55aaffff, 0x0)
21:34:20 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x9000000, 0x0)
21:34:20 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6800, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:34:20 executing program 0:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$KDSETMODE(r0, 0x4b3a, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r4, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18}, 0x0)
ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f00000000c0)={@desc={0x1, 0x0, @desc4}})
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r6, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14520cd7a26828d81a000000000000000100000001000000", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0)
ioctl$RTC_IRQP_SET(r7, 0x4008700c, 0x947)
[ 2876.989728] 9pnet_fd: p9_fd_create_tcp (11552): problem connecting socket to 127.0.0.1
21:34:20 executing program 7:
syz_read_part_table(0x696e5b3, 0x68000000, 0x0)
[ 2877.059115] loop2: detected capacity change from 0 to 215922
21:34:20 executing program 5:
syz_read_part_table(0x0, 0x3f000000, 0x0)
[ 2877.107151] blktrace: Concurrent blktraces are not allowed on sg0
[ 2877.119020] loop2: detected capacity change from 0 to 215922
21:34:20 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xa000000, 0x0)
21:34:20 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
openat(r0, &(0x7f00000000c0)='./file0\x00', 0x470001, 0x2)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @private=0xa010101}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x77b8585a)
[ 2877.156287] loop4: detected capacity change from 0 to 215922
[ 2877.304209] loop4: detected capacity change from 0 to 215922
21:34:38 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c00, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:34:38 executing program 5:
syz_read_part_table(0x0, 0x48000000, 0x0)
21:34:38 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0))
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0)
statx(r3, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:34:38 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a00, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:34:38 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xd000000, 0x0)
21:34:38 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x111000, 0x10)
ioctl$int_out(r2, 0x0, &(0x7f00000003c0))
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:34:38 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
openat(r1, &(0x7f00000003c0)='./file0\x00', 0x2400, 0x128)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:34:38 executing program 7:
syz_read_part_table(0x696e5b3, 0x6a4b0300, 0x0)
[ 2894.669420] 9pnet_fd: p9_fd_create_tcp (11587): problem connecting socket to 127.0.0.1
21:34:38 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0xf000000, 0x0)
21:34:38 executing program 3:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r1, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0})
sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, r4, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r5}, @void}}}, 0x1c}}, 0x0)
sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r2, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, r4, 0x20, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_OPER_CLASS={0x5, 0xd6, 0xab}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008100}, 0x40040)
r6 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:34:38 executing program 0:
keyctl$clear(0x7, 0x0)
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "04f87f699c26e0ae67b7170387d0e8f232a8a630b077acfcce3e84e53e15f44928493d100f1b30d39d9d235109a0c153814b8e65430c1c1e75e054874f7790e678de052716ef6fd728da41671cabad66a13bb63d4dbcffcdc73732fbacd84b32a546e7c84a690d4d40fbf605585457c28bb24399c8c310c6199abf50359eaff9211b5bf0b44247d9f6ab2d3a61308894dc4f92c8ae74df5a2123fcac5a4f9c9e324ce4c242289cfaad36ed509c215afb655463f356475fd32770d1f59d9ce732cb42781693ecf5c4863f06139279a14fd0d2248f155ce6cd5031aa454574792a02262a1f70dcdfcbf1c2e3a2669e4552c96042ae42b1a67d48e29854f68fdc8de82304657fae08e54443afdd091c2859a8043512fe34055091bcfa902663666fe985d6416d0efac9b26fd461e798be179a328870116b264cbfa714253cc37b8115f282c4fd886489871d83fa67b4ecbe52792051274bcbd375bbf2b8fc9986b56480d64baf39c91d641dc9ff3f698c9ee46ac35d969b78bea2e5c272bd8b347d91784d118de5b0b7d5c59fee38c0ecf5cf8a7bbc8f31370631bd591cc8b14c116369c1ed8b062a1583e5ed8abd516b19e903778b637f88318157e4d6253cef022923acb85a73b10225cb1c147bfa3f554518d2524b6c13a5c71084c9dc20280d0430cc4bf403cf457a06497f19cd0ff0bdcbd9882c6b09b4f49a15c621dbfed6"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:34:38 executing program 5:
syz_read_part_table(0x0, 0x4c000000, 0x0)
[ 2894.757420] blktrace: Concurrent blktraces are not allowed on sg0
[ 2894.760112] loop2: detected capacity change from 0 to 215922
21:34:38 executing program 7:
syz_read_part_table(0x696e5b3, 0x6c000000, 0x0)
[ 2894.786467] loop2: detected capacity change from 0 to 215922
[ 2894.823074] loop4: detected capacity change from 0 to 215922
21:34:38 executing program 2:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7400, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:34:38 executing program 7:
syz_read_part_table(0x696e5b3, 0x6f690000, 0x0)
21:34:38 executing program 6:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x11000000, 0x0)
[ 2894.959651] loop4: detected capacity change from 0 to 215922
21:34:38 executing program 5:
syz_read_part_table(0x0, 0x68000000, 0x0)
21:34:38 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r1 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
pipe(&(0x7f00000000c0)={0xffffffffffffffff})
mount_setattr(r3, &(0x7f00000003c0)='./file0\x00', 0x800, &(0x7f0000000400)={0x100074, 0x173, 0x120000, {r0}}, 0x20)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
[ 2895.077143] loop2: detected capacity change from 0 to 215922
[ 2895.105699] blktrace: Concurrent blktraces are not allowed on sg0
21:34:54 executing program 1:
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x50100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x25}})
mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_loose}, {@cachetag={'cachetag', 0x3d, ')'}}, {@version_9p2000}], [{@uid_gt={'uid>', 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}})
pwrite64(0xffffffffffffffff, &(0x7f0000000080)="a4", 0x1, 0x0)
syz_io_uring_complete(0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0100000000010000002f66"])
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0))
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0)
statx(r3, &(0x7f0000000380)='./file1\x00', 0x0, 0x400, &(0x7f00000003c0))
sendfile(r2, r0, 0x0, 0xfffffdef)
21:34:54 executing program 4:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0))
r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0xc2d6, 0x1, 0xd6c2})
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000d00)={@multicast1, @initdev, 0x0}, &(0x7f0000000d40)=0xc)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000d80)={@private=0xa010102, @multicast1, r4}, 0xc)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
21:34:54 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x20a00)
r0 = perf_event_open(&(0x7f0000001480)={0x4, 0x80, 0x0, 0xfd, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x6, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff})
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0)
sendmsg$unix(r2, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18}, 0x0)
ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000440)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x0, "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"})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='./filc0\x00'])
r5 = syz_open_dev$vcsa(&(0x7f00000003c0), 0x9, 0x204000)
ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000400)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r6 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x24})
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
syz_read_part_table(0x696e5b3, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000004c0)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0,